Skip to content

Commit d4d2f9b

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/memdocs-pr into in2205-model-14439211
2 parents d70990d + 4e20e42 commit d4d2f9b

166 files changed

Lines changed: 2691 additions & 2095 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

.openpublishing.redirection.json

Lines changed: 39 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,44 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "memdocs/intune/fundamentals/end-user-company-portal-messages.md",
5+
"redirect_url": "/mem/intune/user-help/sign-in-to-the-company-portal",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path": "memdocs/intune/user-help/your-device-is-noncompliant-cant-evaluate.md",
10+
"redirect_url": "/mem/intune/user-help/",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path": "memdocs/intune/user-help/you-need-to-update-your-company-portal-app-windows.md",
15+
"redirect_url": "/mem/intune/user-help/install-a-new-version-of-the-company-portal-app",
16+
"redirect_document_id": false
17+
},
18+
{
19+
"source_path": "memdocs/intune/user-help/what-happens-if-you-install-the-Company-Portal-app-and-enroll-your-device-in-intune-ios.md",
20+
"redirect_url": "/mem/intune/user-help/use-managed-devices-to-get-work-done",
21+
},
22+
{
23+
"source_path": "memdocs/intune/user-help/how-to-set-the-period-before-your-android-device-is-locked.md",
24+
"redirect_url": "/mem/intune/user-help/set-the-amount-of-time-before-your-device-is-locked-android",
25+
"redirect_document_id": false
26+
},
27+
{
28+
"source_path": "memdocs/intune/user-help/how-to-reconnect-a-compromised-android-device.md",
29+
"redirect_url": "/mem/intune/user-help/your-device-is-rooted-and-you-cant-connect-android",
30+
"redirect_document_id": false
31+
},
32+
{
33+
"source_path": "memdocs/intune/user-help/how-to-encrypt-your-windows-device.md",
34+
"redirect_url": "https://support.microsoft.com/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838",
35+
"redirect_document_id": false
36+
},
37+
{
38+
"source_path": "memdocs/intune/fundamentals/end-user-mam-apps-android.md",
39+
"redirect_url": "/mem/intune/user-help/use-managed-apps-on-your-device-android",
40+
"redirect_document_id": true
41+
},
342
{
443
"source_path": "memdocs/intune/configuration/vpn-settings-windows-phone-8-1.md",
544
"redirect_url": "https://support.microsoft.com/windows/windows-phone-8-1-end-of-support-faq-7f1ef0aa-0aaf-0747-3724-5c44456778a3",

memdocs/analytics/proactive-remediations.md

Lines changed: 17 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Tutorial - Proactive remediations
33
titleSuffix: Microsoft Endpoint Manager
44
description: A tutorial on using Proactive remediations to enhance the user
5-
ms.date: 03/07/2022
5+
ms.date: 07/05/2022
66
ms.prod: configuration-manager
77
ms.technology: configmgr-analytics
88
ms.topic: tutorial
@@ -120,9 +120,24 @@ Proactive remediation scripts need to be encoded in UTF-8. Uploading these scrip
120120

121121
For information about enforcing script signature checks, see [Script requirements](#bkmk_requirements).
122122
1. Click **Next** then assign any **Scope tags** you need.
123-
1. In the **Assignments** step, select the device groups to which you want to deploy the script package. When you're ready to deploy the packages to your users or devices, you can also use filters. For more information, see [Create filters in Microsoft Intune](../intune/fundamentals/filters.md).
123+
1. In the **Assignments** step, select the device groups to which you want to deploy the script package. When you're ready to deploy the packages to your users or devices, you can also use filters. For more information, see [Create filters in Microsoft Intune](../intune/fundamentals/filters.md).
124124
1. Complete the **Review + Create** step for your deployment.
125125

126+
## <a name="bkmk_prs_policy"></a> Client policy retrieval and client reporting
127+
128+
The client retrieves policy for proactive remediations scripts at the following times:
129+
130+
- After a restart of the device or Intune management extension service
131+
- After a user signs into the client
132+
- Once every 8 hours
133+
- The 8 hour script retrieval schedule is fixed based on when the Intune management extension service starts. The schedule isn't altered by user sign ins.
134+
135+
The client reports proactive remediation information at the following times:
136+
137+
- When a script is set to run once, the results are reported after the script runs.
138+
- Recurring scripts follow a 7 day reporting cycle:
139+
- Within the first 6 days, the client reports only if a change occurs. The first time the script runs would be considered a change.
140+
- Every 7 days the client sends a report even if there wasn't a change.
126141

127142
## <a name="bkmk_prs_monitor"></a> Monitor your script packages
128143

memdocs/analytics/startup-performance.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ For devices enrolled via Intune, Startup performance insights are only available
2929
For devices that do not meet the above criteria, you are able to [enroll via Configuration Manager](enroll-configmgr.md).
3030

3131
> [!Important]
32-
> Client devices require a restart to fully enable all analytics. <!--7698085-->
32+
> Client devices require a restart to fully enable all analytics. <!--7698085--> The retention period for device boot and sign-in events is 29 days. If a device has not uploaded a boot or sign-in event in the past 29 days, it will not appear in the Startup performance report.
3333
## <a name="bkmk_score"></a> Startup score
3434
3535
[!INCLUDE [Endpoint analytics startup score](includes/startup-score.md)]
@@ -55,7 +55,7 @@ Startup performance provides an insight on the number of devices that have delay
5555

5656
If you click through to a particular device, you can see its boot and sign-in history. The history helps you determine if the issue is a regression and when it might have occurred.
5757

58-
While there are many articles on how to optimize Group Policies performance, you may choose to migrate to cloud-management instead. Migrating to cloud-management allows you to use [Intune security baselines](../intune/protect/security-baselines.md) and the soon-to-be-released Policy Analytics tool.
58+
While there are many articles on how to optimize Group Policies performance, you may choose to migrate to cloud-management instead. Migrating to cloud-management allows you to use [Intune security baselines](../intune/protect/security-baselines.md) and [Group Policy analytics](../intune/configuration/group-policy-analytics.md).
5959

6060
### <a name="bkmk_sb"></a> Slow boot and sign-in times
6161

memdocs/analytics/troubleshoot.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ For Intune or co-managed devices configured with the Intune data collection poli
8181

8282
For Configuration Manager-managed devices:
8383
1. Ensure all devices you want to see performance data are [enrolled](enroll-configmgr.md#bkmk_cm_enroll).
84-
1. Check if the data upload from Configuration Manager to the Gateway Service was successful by looking at the error messages on the **UXAnalyticsUploadWorker.log** file on the site server.
84+
1. Check if the data upload from Configuration Manager to the Gateway Service was successful by looking at the error messages on the **UXAnalyticsUploadWorker.log** file on the site system hosting Service Connection Point role.
8585
1. Check if an admin has custom overrides for client settings. In the Configuration Manager console, go to the **Devices** workspace, find the target devices, and in the **Client settings** group, select the **Resultant client settings**. If endpoint analytics is disabled, there's an overriding client setting. Find the overriding client settings and enable endpoint analytics on it.
8686
1. Check if missing client devices are sending data to the site server by reviewing the **SensorEndpoint.log** file located in `C:\Windows\CCM\Logs\` on client devices. Look for *Message sent* messages.
8787
1. Check and resolve any errors occurring during processing of the boot events by reviewing the **SensorManagedProvider.log** file located in `C:\Windows\CCM\Logs\` on client devices.

memdocs/autopilot/add-devices.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -43,6 +43,9 @@ This article provides step-by-step guidance for manual registration. For more in
4343

4444
Device enrollment requires *Intune Administrator* or *Policy and Profile Manager* permissions. You can also create a custom Autopilot device manager role by using [role-based access control](../intune/fundamentals/role-based-access-control.md). Autopilot device management requires only that you enable all permissions under **Enrollment programs**, except for the four token management options.
4545

46+
> [!NOTE]
47+
> In both Intune Administrator and role-based access control methods, the administrative user also requires consent to use the Microsoft Intune PowerShell enterprise application.
48+
4649
## Collect the hardware hash
4750

4851
The following methods are available to harvest a hardware hash from existing devices:

memdocs/autopilot/bitlocker.md

Lines changed: 36 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1,54 +1,73 @@
11
---
22
title: Setting the BitLocker encryption algorithm for Autopilot devices
33
description: Microsoft Intune provides a comprehensive set of configuration options to manage BitLocker on Windows devices.
4-
keywords: Autopilot, BitLocker, encryption, 256-bit, Windows 10
54
ms.prod: w10
6-
ms.mktglfcycl: deploy
7-
ms.sitesec: library
8-
ms.pagetype: deploy
95
ms.localizationpriority: medium
10-
audience: itpro
116
author: aczechowski
127
ms.author: aaroncz
138
ms.reviewer: jubaptis
149
manager: dougeby
15-
ms.date: 12/16/2020
10+
ms.date: 06/15/2022
1611
ms.collection: M365-modern-desktop
1712
ms.topic: how-to
1813
---
1914

20-
2115
# Setting the BitLocker encryption algorithm for Autopilot devices
2216

2317
**Applies to**
2418

2519
- Windows 11
2620
- Windows 10
2721

28-
With Windows Autopilot, you can configure BitLocker encryption settings to get applied before automatic encryption starts. This configuration makes sure the default encryption algorithm isn't applied automatically. Other BitLocker policies can also be applied before automatic BitLocker encryption begins.
22+
BitLocker [automatically encrypts](/windows-hardware/design/device-experiences/oem-bitlocker#bitlocker-automatic-device-encryption) internal drives during the out of box experience (OOBE) for devices that support [Modern Standby](/windows-hardware/design/device-experiences/modern-standby) or meet the [Hardware Security Testability Specification (HSTI)](/windows-hardware/test/hlk/testref/hardware-security-testability-specification). By default, BitLocker uses XTS-AES 128-bit used space only for automatic encryption.
23+
24+
With Windows Autopilot, you can configure BitLocker encryption settings to apply before automatic encryption starts. This configuration makes sure the default encryption algorithm or type isn't applied automatically. A device that receives these settings after encrypting automatically will need to be decrypted before changing the encryption algorithm.
25+
26+
## Encryption algorithm
27+
28+
The BitLocker encryption algorithm is used when BitLocker is first enabled. During Autopilot, BitLocker will be enabled after the device setup portion of the [enrollment status page](enrollment-status.md). The following encryption algorithms are available:
2929

30-
The BitLocker encryption algorithm is used when BitLocker is first enabled. The algorithm sets the strength for full volume encryption. Available encryption algorithms are: AES-CBC 128-bit, AES-CBC 256-bit, XTS-AES 128-bit, or XTS-AES 256-bit encryption. The default value is XTS-AES 128-bit encryption. See [BitLocker CSP](/windows/client-management/mdm/bitlocker-csp) for information about the recommended encryption algorithms to use.
30+
- AES-CBC 128-bit
31+
- AES-CBC 256-bit
32+
- XTS-AES 128-bit (default)
33+
- XTS-AES 256-bit
34+
35+
For more information about the recommended encryption algorithms to use, see [BitLocker CSP](/windows/client-management/mdm/bitlocker-csp).
3136

3237
To make sure the BitLocker encryption algorithm you want is set before automatic encryption occurs for Autopilot devices:
3338

34-
1. Configure the [encryption method settings](../intune/protect/endpoint-protection-windows-10.md#windows-encryption) in the Windows Endpoint Protection profile to the encryption algorithm you want.
39+
1. Configure the [encryption method settings](../intune/protect/encrypt-devices.md#create-an-endpoint-security-policy-for-bitlocker) in the Endpoint Security disk encryption policy. The settings are available under **Endpoint Security** > **Disk encryption** > **Create policy** > **Platform** = Windows 10 and later, **Profile type** = BitLocker.
40+
3541
2. [Assign the policy](../intune/configuration/device-profile-assign.md) to your Autopilot device group. The encryption policy must be assigned to **devices** in the group, not users.
36-
3. Enable the Autopilot [Enrollment Status Page](enrollment-status.md) (ESP) for these devices. If the ESP isn't enabled, the policy won't apply before encryption starts.
3742

38-
An example of Microsoft Intune Windows Encryption settings is shown below.
43+
3. Enable the Autopilot [enrollment status page](enrollment-status.md) for these devices. If you don't enable this feature, the policy won't apply before encryption starts.
44+
45+
The following image is an example of the Endpoint Security disk encryption settings.
3946

40-
![BitLocker encryption settings.](images/bitlocker-encryption.png)
47+
:::image type="content" source="media/bitlocker/endpoint-security-disk-encryption-policy.png" alt-text="Screenshot example of the Endpoint Security disk encryption settings.":::
4148

42-
A device that is encrypted automatically will need to be decrypted before changing the encryption algorithm.
49+
## Full disk or used space-only encryption
4350

44-
The settings are available under **Device Configuration** > **Profiles** > **Create profile** > **Platform** = Windows 10 and later, Profile type = Endpoint protection > **Configure** > **Windows Encryption** > **BitLocker base settings**, Configure encryption methods = Enable.
51+
There are two types of encryption, full disk or used space-only. The type of encryption is automatically determined by configuration of [silent enablement](../intune/protect/encrypt-devices.md#silently-enable-bitlocker-on-devices) and hardware support for modern standby. You can enforce it by configuring the [SystemDrivesEncryptionType](/windows/client-management/mdm/bitlocker-csp) setting. Like the encryption algorithm, the encryption type is used when BitLocker is first enabled. For more information on the expected encryption type behavior, see [Manage BitLocker policy](../intune/protect/encrypt-devices.md#full-disk-vs-used-space-only-encryption).
4552

46-
It's also recommended to set **Windows Encryption** > **Windows Settings** > **Encrypt** = Require.
53+
To enforce the type of drive encryption used:
54+
55+
1. Configure the **Enforce drive encryption type on operating system drives** setting within the [settings catalog](../intune/configuration/settings-catalog.md). This setting is available in the **Administrative Templates > Windows Components > BitLocker Drive Encryption > Operating System Drives** category from the settings picker.
56+
57+
2. [Assign the policy](../intune/configuration/device-profile-assign.md) to your Autopilot device group. The encryption policy must be assigned to **devices** in the group, not users.
58+
59+
3. Enable the Autopilot [enrollment status page](enrollment-status.md) for these devices. If you don't enable this feature, the policy won't apply before encryption starts.
60+
61+
The following image is an example of the settings catalog profile.
62+
63+
:::image type="content" source="media/bitlocker/settings-catalog-drive-type.png" alt-text="Screenshot example of the BitLocker drive type configuration in the settings catalog.":::
4764

4865
## Requirements
4966

50-
Windows 10, version 1809 or later.
67+
A supported version of Windows 11 or Windows 10.
5168

5269
## Next steps
5370

5471
[BitLocker overview](/windows/security/information-protection/bitlocker/bitlocker-overview)
72+
73+
[Manage BitLocker policy for Windows devices with Intune](../intune/protect/encrypt-devices.md)

memdocs/autopilot/index.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -123,4 +123,4 @@ landingContent:
123123
- text: Windows Autopilot and Surface devices
124124
url: /surface/windows-autopilot-and-surface-devices
125125
- text: Windows Autopilot for HoloLens 2
126-
url: https://docs.microsoft.com/hololens/hololens2-autopilot
126+
url: /hololens/hololens2-autopilot

memdocs/autopilot/known-issues.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,11 @@ This article describes known issues that can often be resolved by configuration
2828

2929
## Known issues
3030

31-
### `DefaultuserX` profile not deleted
31+
### Autopilot profile not being applied when assigned
32+
33+
In Windows 10 April (KB5011831) release, there is an issue where the Autopilot profile may fail to apply to the device. As a result, any settings made in the profile may not be configured for the user such as device renaming. To resolve this issue, the May (KB5015020) cumulative update needs to be applied to the device.
34+
35+
### DefaultuserX profile not deleted
3236

3337
When you use the [EnableWebSignIn CSP](/windows/client-management/mdm/policy-csp-authentication#authentication-enablewebsignin), the `defaultuserX` profile may not be deleted. This CSP isn't currently supported. It's in preview mode only and not recommended for production purposes at this time.
3438

73.7 KB
Loading
23.3 KB
Loading

0 commit comments

Comments
 (0)