Skip to content

Commit cb0df4c

Browse files
author
Angela Fleischmann
authored
Merge pull request #7548 from MicrosoftDocs/main
Publish 05/05/2022 3:30 PM PT
2 parents cce6d6e + c6aadf0 commit cb0df4c

8 files changed

Lines changed: 227 additions & 10 deletions

memdocs/intune/apps/apps-add-android-for-work.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ keywords:
88
author: Erikre
99
ms.author: erikre
1010
manager: dougeby
11-
ms.date: 03/29/2022
11+
ms.date: 05/05/2022
1212
ms.topic: how-to
1313
ms.service: microsoft-intune
1414
ms.subservice: apps
@@ -235,6 +235,7 @@ For dedicated, fully managed, and corporate-owned work profile devices, you can
235235

236236
- **Default**: The app's updates are subject to default conditions (described above).
237237
- **High Priority**: The app will update as soon as possible from when a new update is released, disregarding all of the default conditions. This may be disruptive for some users since the update can occur while the device is being used.
238+
- **Postpone**: When the app receives a new update, a 90-day waiting period is triggered. After 90 days, the app is updated to the newest version available, even if that version was not the update that triggered the waiting period. Note that the 90-day window is not configurable. To terminate the waiting period early, change the update mode to either **Default** or **High Priority**.
238239

239240
To edit the app update mode:
240241
1. Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431).

memdocs/intune/configuration/tutorial-walkthrough-administrative-templates.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ This feature applies to:
6767
6868
## Prerequisites
6969

70-
- A Microsoft 365 E3 or E5 subscription, which includes Intune and Azure Active Directory (AD) premium. If you don't have an E3 or E5 subscription, [try it for free](/office365/admin/try-or-buy-microsoft-365).
70+
- A Microsoft 365 E3 or E5 subscription, which includes Intune and Azure Active Directory (AD) premium. If you don't have an E3 or E5 subscription, [try it for free](/microsoft-365/commerce/try-or-buy-microsoft-365).
7171

7272
For more information on what you get with the different Microsoft 365 licenses, see [Transform your Enterprise with Microsoft 365](https://www.microsoft.com/microsoft-365/compare-all-microsoft-365-plans).
7373

memdocs/intune/configuration/wired-network-settings-windows.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,7 @@ This article describes the settings you can configure.
8787
- **PKCS certificate**: Select an existing PKCS **client certificate** profile and existing trusted **root certificate** that are also deployed to the device. The client certificate is the identity presented by the device to the server to authenticate the connection.
8888
- **PFX Import certificate**: Select an existing imported PFX certificate profile. The client certificate is the identity presented by the device to authenticate the connection.
8989

90-
For more information on imported PFX certificates, see [Configure and use imported PKCS certificates with Intune](/protect/certificates-imported-pfx-configure).
90+
For more information on imported PFX certificates, see [Configure and use imported PKCS certificates with Intune](/mem/intune/protect/certificates-imported-pfx-configure).
9191

9292
- **Derived credential**: Select an existing certificate profile that's derived from a user's smart card. For more information, see [Use derived credentials in Microsoft Intune](../protect/derived-credentials.md).
9393

@@ -114,7 +114,7 @@ This article describes the settings you can configure.
114114

115115
- **PFX Import certificate**: Select an existing imported PFX certificate profile. The client certificate is the identity presented by the device to authenticate the network connection.
116116

117-
For more information on imported PFX certificates, see [Configure and use imported PKCS certificates with Intune](/protect/certificates-imported-pfx-configure).
117+
For more information on imported PFX certificates, see [Configure and use imported PKCS certificates with Intune](/mem/intune/protect/certificates-imported-pfx-configure).
118118

119119
- **Identity privacy (outer identity)**: Enter the text sent in response to an EAP identity request. This text can be any value, such as `anonymous`. During authentication, this anonymous identity is initially sent, and then followed by the real identification sent in a secure tunnel.
120120

@@ -150,7 +150,7 @@ This article describes the settings you can configure.
150150

151151
- **PFX Import certificate**: Select an existing imported PFX certificate profile. The client certificate is the identity presented by the device to authenticate the network connection.
152152

153-
For more information on imported PFX certificates, see [Configure and use imported PKCS certificates with Intune](/protect/certificates-imported-pfx-configure).
153+
For more information on imported PFX certificates, see [Configure and use imported PKCS certificates with Intune](/mem/intune/protect/certificates-imported-pfx-configure).
154154

155155
- **Identity privacy (outer identity)**: Enter the text sent in response to an EAP identity request. This text can be any value, such as `anonymous`. During authentication, this anonymous identity is initially sent, and then followed by the real identification sent in a secure tunnel.
156156

memdocs/intune/enrollment/corporate-identifiers-add.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,8 @@ At the time of enrollment, Intune automatically assigns corporate-owned status t
4242
- Enrolled with the Apple [Device Enrollment Program](device-enrollment-program-enroll-ios.md), [Apple School Manager](apple-school-manager-set-up-ios.md), or [Apple Configurator](apple-configurator-enroll-ios.md) (iOS/iPadOS only)
4343
- [Identified as corporate-owned before enrollment](#identify-corporate-owned-devices-with-imei-or-serial-number) with an international mobile equipment identifier (IMEI) numbers (all platforms with IMEI numbers) or serial number (iOS/iPadOS and Android)
4444
- Enrolled as [Android Enterprise corporate-owned devices with work profile](./android-corporate-owned-work-profile-enroll.md)
45+
- Enrolled as [Android Enterprise fully managed devices](./android-fully-managed-enroll.md)
46+
- Enrolled as [Android Enterprise dedicated devices](./android-kiosk-enroll.md)
4547
- Joined to Azure Active Directory with work or school credentials. [Devices that are Azure Active Directory registered](/azure/active-directory/devices/overview) will be marked as personal.
4648
- Set as corporate in the [device's properties list](#change-device-ownership)
4749

@@ -141,4 +143,4 @@ You can configure a push notification to send to both your Android and iOS/iPadO
141143

142144
When a device's ownership type is changed from Corporate to Personal, Intune deletes all app information previously collected from that device within 7 days. If applicable, Intune will also delete the phone number on record. Intune will still collect an inventory of apps installed by the IT admin on the device and will still collect a partial phone number for the device after it is marked as personal.
143145

144-
This setting can be found in the Microsoft Endpoint Manager by selecting **Tenant administration** > **Customization**. For more information, see [Company Portal - Configuration](../apps/company-portal-app.md#configuration).
146+
This setting can be found in the Microsoft Endpoint Manager by selecting **Tenant administration** > **Customization**. For more information, see [Company Portal - Configuration](../apps/company-portal-app.md#configuration).

memdocs/intune/enrollment/windows-enrollment-status.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -138,7 +138,7 @@ Intune applies the default profile to all users and all devices when no other ES
138138

139139

140140
## Prioritize profiles
141-
If you assign a user or device more than one ESP profile, the profile with the highest priority takes precedence over the other profiles.
141+
If you assign a user or device more than one ESP profile, the profile with the highest priority takes precedence over the other profiles. The profile set to 1 has the highest priority.
142142

143143
Intune applies profiles in the following order:
144144

0 commit comments

Comments
 (0)