Skip to content

Commit bafe224

Browse files
committed
Merge branch 'main' into release-win365-2209
2 parents 0f7f370 + 203ba85 commit bafe224

7 files changed

Lines changed: 52 additions & 12 deletions

File tree

memdocs/intune/fundamentals/multi-admin-approval.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,9 @@ ms.collection:
2929

3030
# Use Access policies to require multiple administrative approvals
3131

32+
> [!NOTE]
33+
> This feature is delayed and is not yet available. We'll remove this note when this feature begins to roll out to tenants.
34+
3235
*This feature is in Public Preview*
3336

3437
To help protect against a compromised administrative account, use Intune *access policies* to require that a second administrative account is used to approve a change before the change is applied. This capability is known as multiple administrative approval (MAA).

memdocs/intune/fundamentals/whats-new.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -141,7 +141,7 @@ Applies to:
141141
#### Device Firmware Configuration Interface (DFCI) now supports Acer devices<!-- 15240661 -->
142142
For Windows 10/11 devices, you can create a DFCI profile to manage UEFI (BIOS) settings (**Devices** > **Configuration profiles** > **Create profile** > **Windows 10 and later** for platform > **Templates** > **Device Firmware Configuration Interface** for profile type).
143143

144-
New Acer devices running Windows 10/11 will be enabled for DFCI starting Fall 2022. So, admins can create DFCI profiles to manage the BIOS and then deploy the profiles to these Acer devices.
144+
New Acer devices running Windows 10/11 will be enabled for DFCI in later 2022. So, admins can create DFCI profiles to manage the BIOS and then deploy the profiles to these Acer devices.
145145

146146
Contact your device vendor or device manufacturer to ensure you get eligible devices.
147147

@@ -236,7 +236,10 @@ For more information about protected apps, see [Microsoft Intune protected apps]
236236

237237
### Tenant administration
238238

239-
#### Access policies for Multiple Administrator Approval in public preview<!--9348867 -->
239+
#### Access policies for Multiple Administrator Approval in public preview<!--9348867 -->
240+
> [!NOTE]
241+
> This feature is delayed and is not yet available. We'll remove this note when this feature begins to roll out to tenants.
242+
240243
In public preview, you can use Intune *access policies* to require that a second Administrator Approval account be used to approve a change before the change is applied. This capability is known as multiple Administrator Approval (MAA).
241244

242245
You create an access policy to protect a type of resource, like App deployments. Each access policy also includes a group of users who are *approvers* for the changes protected by the policy. When a resource like an app deployment configuration is protected by an access policy, any changes that are made to the deployment, including creating, deleting or modifying an existing deployment won't apply until a member of the approvers group for that access policy reviews and approves that change.

memdocs/intune/includes/intune-notices.md

Lines changed: 31 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,35 @@ ms.author: erikje
99
ms.custom: include file
1010
---
1111

12-
These notices provide important information that can help you prepare for future Intune changes and features.
12+
These notices provide important information that can help you prepare for future Intune changes and features.
13+
14+
### Plan for Change: Ending support for Company Portal authentication method for iOS/iPadOS ADE enrollment
15+
16+
As we continue to invest in Setup Assistant with modern authentication, which is the Apple supported path to require enrollment during Setup Assistant with optional multi-factor authentication, we plan to remove the Company Portal authentication method from new and existing iOS/iPadOS ADE enrollment profiles in Q1 2023. This will include removing the Run Company Portal in Single App Mode until authentication setting.
17+
18+
### How does this affect you or your users?
19+
20+
In November, new enrollments (new devices that are targeted with an existing enrollment profile or devices re-enrolling) that are targeted with an existing enrollment profile with the Company Portal authentication method, will not be able to enroll.
21+
22+
This will not impact existing enrolled devices unless the device is re-enrolled after this change. The device will not be able to re-enroll until the authentication method is switched in the enrollment profile to Setup Assistant with modern authentication.
23+
24+
New iOS/iPadOS enrollment profiles will not have the option to select Company Portal as the authentication method.
25+
26+
If you have not already, you will need to move to use Setup Assistant with modern authentication. Within the Microsoft Endpoint Manager admin center, you will want to either create a new ADE enrollment profile, or edit your existing enrollment profile to use the “Setup assistant with modern authentication.”
27+
28+
**User experience:** The Setup Assistant with modern authentication enrollment flow does change the enrollment screen order where authentication will occur prior to accessing the home screen. If you have user guides that share screenshots, you will want to update those so the guides match the experience of Setup Assistant with modern authentication.
29+
30+
### How can you prepare?
31+
32+
To enroll new devices (or re-enroll) after this change, you will either need to update existing profiles to move to Setup Assistant with modern authentication or create a new enrollment profile with this method.
33+
34+
For related information, see:
35+
36+
- [Move to Setup Assistant with Modern Authentication for Automated Device Enrollment](https://techcommunity.microsoft.com/t5/intune-customer-success/move-to-setup-assistant-with-modern-authentication-for-automated/ba-p/2556536)
37+
- [Setup Assistant with Modern Auth for ADE (iOS/iPadOS 13+ and macOS 10.15+)](https://aka.ms/MEM-ADEModernAuth-Blog)
38+
- [Using filters with Setup Assistant with modern auth for ADE for corporate iOS/iPadOS/macOS devices](https://techcommunity.microsoft.com/t5/intune-customer-success/using-filters-with-setup-assistant-with-modern-auth-for-ade-for/ba-p/2670379)
39+
- [Enroll iOS/iPadOS devices by using ADE](../enrollment/device-enrollment-program-enroll-ios.md#create-an-apple-enrollment-profile)
40+
- [Upcoming changes to iOS/iPadOS Company Portal app deployment for Setup Assistant with modern auth](https://aka.ms/ADE-CP-auto-deploy)
1341

1442
### Plan for Change: Ending support for Windows Information Protection
1543

@@ -31,7 +59,7 @@ Microsoft strongly recommends that you move to a supported version of Windows 10
3159

3260
### How does this affect you or your users?
3361

34-
If you are managing Windows 8.1 devices those devices should be upgraded to a supported version of Windows 10 or Windows 11. There is no impact to existing devices and polices, however, you will not be able to enroll new devices if they are running Windows 8.1.
62+
If you are managing Windows 8.1 devices those devices should be upgraded to a supported version of Windows 10 or Windows 11. There is no impact to existing devices and policies, however, you will not be able to enroll new devices if they are running Windows 8.1.
3563

3664
### How can you prepare?
3765

@@ -52,7 +80,7 @@ If you're impacted by this change, see MC393815 in the Message center.
5280

5381
Download, install, and configure the latest certificate connector. For more information see, [Install the Certificate Connector for Microsoft Intune](../protect/certificate-connector-install.md).
5482

55-
To check which version of the certificate connector you are using follow these steps:
83+
To check which version of the certificate connector you are using, follow these steps:
5684

5785
1. On a Windows Server running the Intune Certificate Connector, launch "Add or Remove programs".
5886
2. A list of installed programs and applications will be displayed.

memdocs/intune/protect/microsoft-tunnel-conditional-access.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -39,14 +39,14 @@ Before you can configure Conditional Access policies for the tunnel, you must en
3939

4040
2. Download the PowerShell script named **mst-ca-provisioning.ps1** from aka.ms/mst-ca-provisioning.
4141

42-
3. Using credentials that have the Azure Role permissions [equivalent to **Application Administrator**](/azure/active-directory/users-groups-roles/directory-assign-admin-roles#application-administrator-permissions), run the script from any location in your environment, to provision your tenant.
42+
3. Using credentials that have the Azure Role permissions [equivalent to **Global Administrator**](/azure/active-directory/roles/permissions-reference#global-administrator), run the script from any location in your environment, to provision your tenant.
4343

44-
The script modifies your tenant by creating a service principle with the following details:
44+
The script modifies your tenant by creating a service principal with the following details:
4545

4646
- App ID: 3678c9e9-9681-447a-974d-d19f668fcd88
4747
- Name: Microsoft Tunnel Gateway
4848

49-
The addition of this service principle is required so you can select the tunnel cloud app while configuring Conditional Access policies. It's also possible to use Graph to add the service principle information to your tenant.
49+
The addition of this service principal is required so you can select the tunnel cloud app while configuring Conditional Access policies. It's also possible to use Graph to add the service principal information to your tenant.
5050

5151
4. After the script completes, you can use your normal process to create Conditional Access policies.
5252

windows-365/enterprise/create-provisioning-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ A few things to keep in mind:
5858
6. Select **Next**.
5959
7. On the **Configuration** page, under **Windows settings**, choose a **Language & Region**. The selected language pack will be installed on Cloud PCs provisioned with this policy.
6060
8. Optionally, under **Additional services**, choose a service to be installed on Cloud PCs provisioned with this policy:
61-
- **Windows Autopatch (preview)** is a cloud service that automates updates for Windows, Microsoft 365 Apps for enterprise, Microsoft Edge, and Microsoft Teams on both physical and virtual devices. For more information, see [What is What is Windows Autopatch?](/windows/deployment/windows-autopatch/overview/windows-autopatch-overview) and the [Windows Autopatch FAQ](https://go.microsoft.com/fwlink/?linkid=2200228).
61+
- **Windows Autopatch** is a cloud service that automates updates for Windows, Microsoft 365 Apps for enterprise, Microsoft Edge, and Microsoft Teams on both physical and virtual devices. For more information, see [What is What is Windows Autopatch?](/windows/deployment/windows-autopatch/overview/windows-autopatch-overview) and the [Windows Autopatch FAQ](https://go.microsoft.com/fwlink/?linkid=2200228).
6262
- **Microsoft Managed Desktop** is a cloud service that helps with device deployment, service management and operations, and security. For more information, see [What is Microsoft Managed Desktop?](/managed-desktop/intro/)
6363
9. Select **Next**.
6464
10. On the **Assignments** page, choose **Select groups** > choose the groups you want this policy assigned to > **Select** > **Next**. Nested groups aren't currently supported.

windows-365/enterprise/customer-permissions.md

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -39,21 +39,24 @@ Windows 365 uses the Azure role-based access control (RBAC) permissions required
3939

4040
## Create Azure network connections
4141

42-
You create ANCs to define the connection between your network and the Windows 365 system so that Cloud PCs can be successfully provisioned. When you create an ANC, the Windows 365 service requires the following permissions:
42+
You create ANCs to define the connection between your network and the Windows 365 system so that Cloud PCs can be successfully provisioned. When you create an ANC, the Windows 365 [service principal](/azure/active-directory/fundamentals/service-accounts-introduction-azure.md#service-principals) requires the following permissions:
4343

4444
- **Reader permission on the Azure subscription**: This permission is used to simplify the flow when adding a custom image.
4545
- **Network contributor on the specified resource group**: This permission is used to create network interface cards in the selected resource group.
4646
- **Network contributor on the virtual network**: This permission is used to attach the created network interface cards to the selected virtual network.
4747

48-
When you create an ANC, you must be signed in with an account that is an Owner of the subscription.
48+
When you create an ANC, you must be signed in with an account that is an Owner of the subscription.
49+
50+
> [!TIP]
51+
> When you use [Microsoft hosted network option](architecture.md#virtual-network-connectivity) with a gallery image, you do not need to grant the Windows 365 service principal these permissions.
4952
5053
For more information, see [Create Azure network connection](create-azure-network-connection.md).
5154

5255
## Add a custom image
5356

5457
If you’ve already created an ANC for the image's associated Azure subscription, no new permissions are needed.
5558

56-
When you use a subscription without an ANC, the Windows 365 service requires the following permission to upload a custom image:
59+
When you use Windows 365 with a Microsoft hosted network and a custom image, the Windows 365 service principal requires the following permission to upload a custom image:
5760

5861
- Reader of the subscription
5962

windows-365/enterprise/resize-cloud-pc.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -49,6 +49,7 @@ To resize a Cloud PC, the admin must have any of the following built in Azure Ac
4949

5050
- Global Admin
5151
- Intune Service Admin
52+
- Intune Reader + Cloud PC Admin roles
5253

5354
Alternatively, you can assign a custom role that includes the permissions of the built-in roles above.
5455

@@ -58,6 +59,8 @@ The **Resize** remote action is supported for paid, preview, and trial licenses.
5859

5960
Resizing isn’t supported for Cloud PCs provisioned through group-based licenses.
6061

62+
Resizing is only supported for Gen 2 Cloud PCs. If you try resizing a Gen 1 Cloud PC, the resize will no start and you will be notified that this happened due to the user having a Gen 1 Cloud PC. Reprovision the Gen 1 Cloud PC to convert it to a Gen 2 Cloud PC
63+
6164
## Resize a Cloud PC
6265

6366
1. Contact your end users and have them save their work and sign out. Resizing automatically disconnects the user from their session and any unsaved work might be lost. Therefore, it's best to coordinate any resizing with the user before you begin.

0 commit comments

Comments
 (0)