Skip to content

Commit d1a745d

Browse files
authored
Merge branch 'MicrosoftDocs:main' into main
2 parents a76004e + 2ae62f8 commit d1a745d

157 files changed

Lines changed: 1110 additions & 525 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

memdocs/autopilot/enrollment-autopilot.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -52,13 +52,12 @@ ms.collection:
5252

5353
- **Group type**: Select **Security**.
5454
- **Group name** and **Group description**: Enter a name and description for your group.
55-
- **Azure AD roles can be assigned to the group**: **Yes** allows Azure AD roles to be assigned to the group you're creating. Once set, the group is permanently and always allowed to be assigned Azure AD roles. When set to **No**, Azure AD roles aren't assigned to this group.
55+
- **Azure AD roles can be assigned to the group**: Select **No**, Azure AD roles aren't assigned to this group.
5656

5757
For more information, see [Use cloud groups to manage role assignments in Azure AD](/azure/active-directory/roles/groups-concept).
5858

59-
- **Membership type**: Choose how devices become members of this group. Select **Assigned**, **Dynamic user**, or **Dynamic Device**. For more information, see [Add groups to organize users and devices](../intune/fundamentals/groups-add.md).
59+
- **Membership type**: Choose how devices become members of this group. Select **Dynamic Device**. For more information, see [Add groups to organize users and devices](../intune/fundamentals/groups-add.md).
6060
- **Owners**: Select users that own the group. Owners can also delete this group.
61-
- **Members**: Select Autopilot devices that belong to this group. Autopilot devices that aren't enrolled show the serial number for the device name.
6261
- **Dynamic device members**: Select **Add dynamic query** > **Add expression**.
6362

6463
Create rules using Autopilot device attributes. Autopilot devices that meet these rules are automatically added to the group. Creating an expression using non-autopilot attributes doesn't guarantee that devices included in the group are registered to Autopilot.

memdocs/autopilot/existing-devices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ If you want, you can set up an [enrollment status page](enrollment-status.md) (E
8585
Make sure the user account you specify has sufficient administrative rights.
8686
8787
```powershell
88-
Connect-MSGraphApp
88+
Connect-MSGraph
8989
```
9090
9191
Windows requests the user and password for your account with a standard Azure AD form. Type your username and password, and then select **Sign in**.

memdocs/autopilot/networking-requirements.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ author: aczechowski
1313
ms.author: aaroncz
1414
ms.reviewer: jubaptis
1515
manager: dougeby
16-
ms.date: 08/23/2021
16+
ms.date: 08/23/2022
1717
ms.collection:
1818
- M365-modern-desktop
1919
- highpri
@@ -132,7 +132,7 @@ Some of these services will also need to check certificate revocation lists (CRL
132132

133133
The device can be hybrid Azure AD joined. The computer should be on the internal network for hybrid Azure AD join to work. For more information, see [Windows Autopilot user-driven mode](user-driven.md#user-driven-mode-for-hybrid-azure-ad-join).
134134

135-
### <a name="tpm"></a> Autopilot self-Deploying mode and Autopilot pre-provisioning
135+
### <a name="tpm"></a> Autopilot self-deploying mode and Autopilot pre-provisioning
136136

137137
The TPM attestation process requires access to a set of HTTPS URLs, which are unique for each TPM provider. Ensure access to this URL pattern: `*.microsoftaik.azure.net`.
138138

memdocs/autopilot/self-deploying.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ Optionally, you can use a [device-only subscription](https://techcommunity.micro
7171
Self-deploying mode uses a device's TPM 2.0 hardware to authenticate the device into an organization's Azure AD tenant. Therefore, devices without TPM 2.0 can't be used with this mode. Devices must also support TPM device attestation. All new Windows devices should meet these requirements. The TPM attestation process also requires access to a set of HTTPS URLs that are unique for each TPM provider. For more information, see the entry for Autopilot self-Deploying mode and Autopilot pre-provisioning in [Networking requirements](networking-requirements.md#tpm). For Windows Autopilot software requirements, see [Windows Autopilot software requirements](./software-requirements.md).
7272

7373
> [!IMPORTANT]
74-
> If you attempt a self-deploying mode deployment on a device that does not have support TPM 2.0 or on a virtual machine, the process will fail when verifying the device with an 0x800705B4 timeout error (Hyper-V virtual TPMs are not supported). Also note that Windows 10, version 1903 or later is required to use self-deploying mode due to issues with TPM device attestation in Windows 10, version 1809. Since Windows 10 Enterprise 2019 LTSC is based on Windows 10 version 1809, self-deploying mode is also not supported on Windows 10 Enterprise 2019 LTSC.
74+
> If you attempt a self-deploying mode deployment on a device that does not have support TPM 2.0 or on a virtual machine, the process will fail when verifying the device with an 0x800705B4 timeout error (Hyper-V virtual TPMs are not supported). Also note that Windows 10, version 1903 or later is required to use self-deploying mode due to issues with TPM device attestation in Windows 10, version 1809.
7575
>
7676
> See [Windows Autopilot known issues](known-issues.md) and [Troubleshoot Autopilot device import and enrollment](troubleshoot-device-enrollment.md) to review other known errors and solutions.
7777

memdocs/autopilot/windows-autopilot-whats-new.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,10 @@ ms.topic: article
1717

1818
# Windows Autopilot: What's new
1919

20+
## Updates to Autopilot device targeting infrastructure
21+
22+
With Intune 2208 we are updating the Autopilot infrastructure to ensure that the profiles and applications assigned are consistently ready when the devices are deployed. This change reduces the amount of data that needs to be synchronized per-Autopilot device and leverages device lifecycle change events to reduce the amount of time that it takes to recover from device resets for Azure AD and Hybrid Azure AD joined devices. No action is needed to enable this change, it will be rolling out to all clients starting August 2022.
23+
2024
## Update Intune Connector for Active Directory for Hybrid Azure AD joined devices
2125
<!-- 2209 -->
2226

memdocs/configmgr/core/clients/manage/collections/collection-evaluation.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,9 +6,9 @@ ms.date: 06/05/2020
66
ms.prod: configuration-manager
77
ms.technology: configmgr-client
88
ms.topic: conceptual
9-
author: aczechowski
10-
ms.author: aaroncz
11-
manager: dougeby
9+
author: gowdhamankarthikeyan
10+
ms.author: gokarthi
11+
manager: apoorvseth
1212
ms.localizationpriority: medium
1313
---
1414

@@ -30,12 +30,13 @@ At a high level, each individual collection evaluation and update follows these
3030

3131
1. Execute the collection query.
3232
1. Add any systems that are direct members.
33+
1. Add members specified in the *Include* collections.
3334
1. Perform a logical `AND` between the returned results and the limiting collection.
34-
1. Evaluate the *exclude* collections.
35+
1. Remove members specified in the *exclude* collections.
3536

3637
If the exclude collections also have query rules, or have include or exclude collections, evaluate them also. If these collections themselves are limiting collections, evaluate any collections below them. After fully evaluating the tree, return the results to the calling collection.
3738

38-
1. Compare the result set from evaluating the direct members and include collections with the results of evaluating the exclude collections.
39+
1. Compare the result set from evaluating the direct members and include collections with the results of the exclude collections.
3940
1. Write the changes to the database and perform updates.
4041
1. Trigger any dependent collections to update as well. Dependent collections are collections that the current collection limits, or that refer to the current collection using include or exclude rules.
4142

-90.6 KB
Loading

memdocs/configmgr/desktop-analytics/whats-new.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ ms.localizationpriority: medium
2020
>
2121
> To align investments with this shift, **Desktop Analytics will be retired on November 30, 2022**. Over the next year, the types of insights currently found in Desktop Analytics will be incorporated directly into the Microsoft Endpoint Manager admin center.<!-- 10946169 -->
2222
>
23-
> For more information, see [A data-driven approach to managing devices in your organization](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/a-data-driven-approach-to-managing-devices-in-your-organization/ba-p/2932082).
23+
> For more information, see [Preview app and driver compatibility insights in Endpoint Manager](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/preview-app-and-driver-compatibility-insights-in-endpoint/ba-p/3482136).
2424
2525
## July 2021
2626

memdocs/intune/apps/app-protection-framework.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ keywords:
88
author: Erikre
99
ms.author: erikre
1010
manager: dougeby
11-
ms.date: 06/10/2022
11+
ms.date: 08/15/2022
1212
ms.topic: conceptual
1313
ms.service: microsoft-intune
1414
ms.subservice: apps
@@ -129,9 +129,7 @@ The policies in level 1 enforce a reasonable data access level while minimizing
129129
| Simple PIN | Allow | iOS/iPadOS, Android | |
130130
| Select Minimum PIN length | 4 | iOS/iPadOS, Android | |
131131
| Touch ID instead of PIN for access (iOS 8+/iPadOS) | Allow | iOS/iPadOS | |
132-
| Fingerprint instead of PIN for access (Android 9.0+) | Allow | Android | |
133-
| Override biometrics with PIN after timeout | Require | iOS/iPadOS | |
134-
| Override fingerprint with PIN after timeout | Require | Android | |
132+
| Override biometrics with PIN after timeout | Require | iOS/iPadOS, Android | |
135133
| Timeout (minutes of activity) | 720 | iOS/iPadOS, Android | |
136134
| Face ID instead of PIN for access (iOS 11+/iPadOS) | Allow | iOS/iPadOS | |
137135
| Biometric instead of PIN for access | Allow | iOS/iPadOS, Android | |
@@ -215,6 +213,8 @@ The policy settings enforced in level 3 include all the policy settings recommen
215213
| Select Minimum PIN length | 6 | iOS/iPadOS, Android |
216214
| PIN reset after number of days | Yes | iOS/iPadOS, Android |
217215
| Number of days | 365 | iOS/iPadOS, Android |
216+
| Class 3 Biometrics (Android 9.0+)​ | Require | Android |
217+
| Override Biometrics with PIN after biometric updates | Require | Android |
218218

219219
#### Conditional launch
220220

0 commit comments

Comments
 (0)