Skip to content

Commit d83166e

Browse files
author
Angela Fleischmann
authored
Merge pull request #7434 from MicrosoftDocs/main
Publish 04/22/2022 3:30 PM PT
2 parents a832f72 + d8bd863 commit d83166e

3 files changed

Lines changed: 56 additions & 49 deletions

File tree

memdocs/intune/fundamentals/tenant-status.md

Lines changed: 12 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
---
22
# required metadata
33

4-
title: Microsoft Intune Tenant Status page
4+
title: About the Microsoft Intune tenant status page
55
titleSuffix: Microsoft Intune
6-
description: If you use Microsoft Intune, use the Tenant Status page to view details about your tenant, the status of Intune connectors you've configured, view recent service health incidents and advisories.
6+
description: The Intune tenant status page displays details about your tenant and the status of connectors you've configured, and messages intended for tenants and about the Intune service health.
77
keywords:
88
author: brenduns
99
ms.author: brenduns
1010
manager: dougeby
11-
ms.date: 03/23/2022
11+
ms.date: 04/22/2022
1212
ms.topic: conceptual
1313
ms.service: microsoft-intune
1414
ms.subservice: fundamentals
@@ -26,9 +26,15 @@ ms.collection:
2626
- M365-identity-device-management
2727
- highpri
2828
---
29-
# Use the Intune Tenant Status page
29+
# View details about your Tenant on the Intune tenant status page
3030

31-
The Microsoft Intune Tenant Status page is a centralized hub where you can view current and important details about your tenant. Details include license availability and use, connector status, and important communications about the Intune service.
31+
The Microsoft Intune tenant status page is a centralized hub where you can view important details about your tenant. Details include:
32+
33+
- Your tenant name and location
34+
- Service release versions
35+
- Licensed users and enrolled devices
36+
37+
You can also view the status of the Intune connectors you've configured, and health messages for the Intune service and general messages for Tenants.
3238

3339
> [!TIP]
3440
> A tenant is an instance of Azure Active Directory (Azure AD). Your subscription to Intune is hosted by an Azure AD Tenant. For more information, see [Set up a tenant](/azure/active-directory/develop/quickstart-create-new-tenant) in the Azure AD documentation.
@@ -57,6 +63,7 @@ When there's more than a single connector of any one type, the status is a summa
5763
> Some connectors can report a status of *Healthy* or *Connected* but might not be functioning correctly. If you encounter issues with a specific connector, review the any applicable connector logs or open a case with [support](../../get-support.md) to investigate further.
5864
5965
**Connector status:**
66+
6067
- **Unhealthy:**
6168
- The certificate or credential has expired
6269
- The last synchronization was three or more days ago

memdocs/intune/protect/endpoint-protection-windows-10.md

Lines changed: 35 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
---
22
# required metadata
3-
title: Windows 10/11 settings you can deploy with Microsoft Intune to protect managed Windows devices
4-
description: Use Microsoft Intune endpoint protection profiles to manage settings that help protect your enrolled Windows 10 and 11 devices.
3+
title: Settings you can manage with Intune Endpoint Protection profiles for Windows 10/11 devices
4+
description: View the available settings in Intune endpoint protection profiles for managed Windows 10 and 11 devices.
55
author: brenduns
66
ms.author: brenduns
77
manager: dougeby
8-
ms.date: 02/03/2022
8+
ms.date: 04/22/2022
99
ms.topic: reference
1010
ms.service: microsoft-intune
1111

@@ -24,13 +24,12 @@ ms.collection:
2424
- highpri
2525
---
2626

27-
# Windows settings you can deploy with Intune policy to protect Windows devices
27+
# Windows settings you can manage through an Intune Endpoint Protection profile
2828

2929
> [!NOTE]
3030
> [!INCLUDE [not-all-settings-are-documented](../includes/not-all-settings-are-documented.md)]
3131
32-
Microsoft Intune includes many settings to help protect your devices. This article describes some of the settings you can enable and configure in Windows 10 and Windows 11 devices. These settings are created in an endpoint protection configuration profile in Intune to control security, including BitLocker and Microsoft Defender.
33-
32+
Microsoft Intune includes many settings to help protect your devices. This article describes the settings in the device configuration *Endpoint protection* template. To manage device security, you can also use [endpoint security policies](../protect/endpoint-security-policy.md), which focus directly on subsets of device security.
3433
To configure Microsoft Defender Antivirus, see [Windows device restrictions](../configuration/device-restrictions-windows-10.md#microsoft-defender-antivirus) or use [endpoint security Antivirus policy](endpoint-security-antivirus-policy.md).
3534

3635
## Before you begin
@@ -41,7 +40,7 @@ For more information about configuration service providers (CSPs), see [Configur
4140

4241
## Microsoft Defender Application Guard
4342

44-
While using Microsoft Edge, Microsoft Defender Application Guard protects your environment from sites that aren't trusted by your organization. When users visit sites that aren't listed in your isolated network boundary, the sites open in a Hyper-V virtual browsing session. Trusted sites are defined by a network boundary, which are configured in Device Configuration. For more information, see [Create a network boundary on Windows devices](../configuration/network-boundary-windows.md).
43+
For Microsoft Edge, Microsoft Defender Application Guard protects your environment from sites that aren't trusted by your organization. With Application Guard, sites that aren't in your isolated network boundary open in a Hyper-V virtual browsing session. Trusted sites are defined by a network boundary, which are configured in Device Configuration. For more information, see [Create a network boundary on Windows devices](../configuration/network-boundary-windows.md).
4544

4645
Application Guard is only available for 64-bit Windows devices. Using this profile installs a Win32 component to activate Application Guard.
4746

@@ -219,7 +218,7 @@ The following settings are each listed in this article a single time, but all ap
219218
This option is ignored if *Stealth mode* is set to *Block*.
220219

221220
- **Not configured**
222-
- **Block** - IPSec secured packets do not receive exemptions.
221+
- **Block** - IPSec secured packets don't receive exemptions.
223222
- **Allow** - Enable exemptions. The firewall's stealth mode MUST NOT prevent the host computer from responding to unsolicited network traffic that is secured by IPsec.
224223

225224
- **Shielded**
@@ -341,7 +340,8 @@ Custom Firewall rules support the following options:
341340
- **Application(s)**
342341
**Default**: All
343342

344-
Control connections for an app or program. Select one of the following options, and then complete the additional configuration:
343+
Control connections for an app or program. Apps and programs can be specified either by *file path*, *package family name*, or *service name*:
344+
345345
- **Package family name** – Specify a package family name. To find the package family name, use the PowerShell command **Get-AppxPackage**.
346346
Firewall CSP: [FirewallRules/*FirewallRuleName*/App/PackageFamilyName](/windows/client-management/mdm/firewall-csp#packagefamilyname)
347347

@@ -351,7 +351,7 @@ Custom Firewall rules support the following options:
351351
- **Windows service** – Specify the Windows service short name if it's a service and not an application that sends or receives traffic. To find the service short name, use the PowerShell command **Get-Service**.
352352
Firewall CSP: [FirewallRules/*FirewallRuleName*/App/ServiceName](/windows/client-management/mdm/firewall-csp#servicename)
353353

354-
- **All***No additional configuration is available*.
354+
- **All***No configurations is required*
355355

356356
#### IP address settings
357357

@@ -364,8 +364,8 @@ Specify the local and remote addresses to which this rule applies.
364364
Select **Any address** or **Specified address**.
365365

366366
When you use *Specified address*, you add one or more addresses as a comma-separated list of local addresses that are covered by the rule. Valid tokens include:
367-
- Use an asterisk "*" for *any* local address. If you use an asterisk, it must be the only token you use.
368-
- To specify a subnet use either the subnet mask or network prefix notation. If neither a subnet mask nor a network prefix is specified, the subnet mask defaults to 255.255.255.255.
367+
- Use an asterisk `*` for *any* local address. If you use an asterisk, it must be the only token you use.
368+
- Specify a subnet by either the subnet mask or network prefix notation. If a subnet mask or a network prefix isn't specified, the subnet mask defaults to 255.255.255.255.
369369
- A valid IPv6 address.
370370
- An IPv4 address range in the format of "start address - end address" with no spaces included.
371371
- An IPv6 address range in the format of "start address - end address" with no spaces included.
@@ -378,16 +378,16 @@ Specify the local and remote addresses to which this rule applies.
378378

379379
When you use *Specified address*, you add one or more addresses as a comma-separated list of remote addresses that are covered by the rule. Tokens aren't case-sensitive. Valid tokens include:
380380
- Use an asterisk "*" for *any* remote address. If you use an asterisk, it must be the only token you use.
381-
- "Defaultgateway"
382-
- "DHCP"
383-
- "DNS"
384-
- "WINS"
385-
- "Intranet" (supported on Windows versions 1809 and later)
386-
- "RmtIntranet" (supported on Windows versions 1809 and later)
387-
- "Internet" (supported on Windows versions 1809 and later)
388-
- "Ply2Renders" (supported on Windows versions 1809 and later)
389-
- "LocalSubnet" indicates any local address on the local subnet.
390-
- To specify a subnet use either the subnet mask or network prefix notation. If neither a subnet mask nor a network prefix is specified, the subnet mask defaults to 255.255.255.255.
381+
- `Defaultgateway`
382+
- `DHCP`
383+
- `DNS`
384+
- `WINS`
385+
- `Intranet` (supported on Windows versions 1809 and later)
386+
- `RmtIntranet` (supported on Windows versions 1809 and later)
387+
- `Internet` (supported on Windows versions 1809 and later)
388+
- `Ply2Renders` (supported on Windows versions 1809 and later)
389+
- `LocalSubnet` indicates any local address on the local subnet.
390+
- Specify a subnet by either the subnet mask or network prefix notation. If a subnet mask or a network prefix isn't specified, the subnet mask defaults to 255.255.255.255.
391391
- A valid IPv6 address.
392392
- An IPv4 address range in the format of "start address - end address" with no spaces included.
393393
- An IPv6 address range in the format of "start address - end address" with no spaces included.
@@ -399,7 +399,7 @@ Specify the local and remote ports to which this rule applies.
399399
**Default**: Any
400400
Firewall CSP: [FirewallRules/*FirewallRuleName*/Protocol](/windows/client-management/mdm/firewall-csp#protocol)
401401
Select from the following, and complete any required configurations:
402-
- **All** – No additional configuration is available.
402+
- **All** – No configuration is available.
403403
- **TCP** – Configure local and remote ports. Both options support All ports or Specified ports. Enter Specified ports by using a comma-separated list.
404404
- **Local ports** - Firewall CSP: [FirewallRules/*FirewallRuleName*/LocalPortRanges](/windows/client-management/mdm/firewall-csp#localportranges)
405405
- **Remote ports** - Firewall CSP: [FirewallRules/*FirewallRuleName*/RemotePortRanges](/windows/client-management/mdm/firewall-csp#remoteportranges)
@@ -604,7 +604,7 @@ These settings apply specifically to operating system data drives.
604604
BitLocker CSP: [SystemDrivesRecoveryOptions](/windows/client-management/mdm/bitlocker-csp#systemdrivesrecoveryoptions)
605605

606606
- **Enable** - Control how BitLocker-protected operating system drives recover when the required start-up information isn't available.
607-
- **Not configured** - Default recovery options are supported for BitLocker recovery. By default, a DRA is allowed, the recovery options are chosen by the user, including the recovery password and recovery key, and recovery information isn't backed up to AD DS.
607+
- **Not configured** - Default recovery options are supported including DRA. The end user can specify recovery options. Recovery information isn't backed up to AD DS.
608608

609609
When set to *Enable*, you can configure the following settings:
610610

@@ -787,16 +787,16 @@ To learn more, see [Attack surface reduction rules](/windows/security/threat-pro
787787

788788
**Merge behavior for Attack surface reduction rules in Intune**:
789789

790-
Attack surface reduction rules support a merger of settings from different policies, to create a superset of policy for each device. Only the settings that are not in conflict are merged, while those that are in conflict are not added to the superset of rules. Previously, if two policies included conflicts for a single setting, both policies were flagged as being in conflict, and no settings from either profile would be deployed.
790+
Attack surface reduction rules support a merger of settings from different policies, to create a superset of policy for each device. Only the settings that aren't in conflict are merged, while settings that are in conflict aren't added to the superset of rules. Previously, if two policies included conflicts for a single setting, both policies were flagged as being in conflict, and no settings from either profile would be deployed.
791791

792792
Attack surface reduction rule merge behavior is as follows:
793793

794794
- Attack surface reduction rules from the following profiles are evaluated for each device the rules apply to:
795795
- Devices > Configuration policy > Endpoint protection profile > Microsoft Defender Exploit Guard > **Attack Surface Reduction**
796796
- Endpoint security > Attack surface reduction policy > **Attack surface reduction rules**
797797
- Endpoint security > Security baselines > Microsoft Defender for Endpoint Baseline > **Attack Surface Reduction Rules**.
798-
- Settings that do not have conflicts are added to a superset of policy for the device.
799-
- When two or more policies have conflicting settings, the conflicting settings are not added to the combined policy, while settings that don’t conflict are added to the superset policy that applies to a device.
798+
- Settings that don't have conflicts are added to a superset of policy for the device.
799+
- When two or more policies have conflicting settings, the conflicting settings aren't added to the combined policy. Settings that don’t conflict are added to the superset policy that applies to a device.
800800
- Only the configurations for conflicting settings are held back.
801801

802802
**Settings in this profile**:
@@ -997,11 +997,11 @@ Block outbound connections from any app to IP addresses or domains with low repu
997997
- **Upload XML**
998998
**Default**: *Not configured*
999999

1000-
To use exploit protection to [protect devices from exploits](/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection), create an XML file that includes the system and application mitigation settings you want. There are two methods to create the XML file:
1000+
To use *Exploit protection* to [protect devices from exploits](/windows/security/threat-protection/microsoft-defender-atp/microsoft-defender-advanced-threat-protection), create an XML file that includes the system and application mitigation settings you want. There are two methods to create the XML file:
10011001

10021002
- *PowerShell* - Use one or more of the *Get-ProcessMitigation*, *Set-ProcessMitigation*, and *ConvertTo-ProcessMitigationPolicy* PowerShell cmdlets. The cmdlets configure mitigation settings, and export an XML representation of them.
10031003

1004-
- *Microsoft Defender Security Center UI* - In the Microsoft Defender Security Center, click on App & browser control and then scroll to the bottom of the resulting screen to find Exploit Protection. First, use the System settings and Program settings tabs to configure mitigation settings. Then, find the Export settings link at the bottom of the screen to export an XML representation of them.
1004+
- *Microsoft Defender Security Center UI* - In the Microsoft Defender Security Center, select *App & browser control* and then scroll to the bottom of the resulting screen to find Exploit Protection. First, use the System settings and Program settings tabs to configure mitigation settings. Then, find the Export settings link at the bottom of the screen to export an XML representation of them.
10051005

10061006
- **User editing of the exploit protection interface**
10071007
**Default**: Not configured
@@ -1012,7 +1012,7 @@ Block outbound connections from any app to IP addresses or domains with low repu
10121012

10131013
## Microsoft Defender Application Control
10141014

1015-
Choose additional apps that either need to be audited by, or can be trusted to run by Microsoft Defender Application Control. Windows components and all apps from Windows store are automatically trusted to run.
1015+
Choose apps to be audited by or that are trusted to be run by Microsoft Defender Application Control. Windows components and all apps from Windows store are automatically trusted to run.
10161016

10171017
- **Application control code integrity policies**
10181018
**Default**: Not configured
@@ -1022,7 +1022,7 @@ Choose additional apps that either need to be audited by, or can be trusted to r
10221022

10231023
After being enabled on a device, Application Control can only be disabled by changing the mode from *Enforce* to *Audit only*. Changing the mode from *Enforce* to *Not Configured* results in Application Control continuing to be enforced on assigned devices.
10241024

1025-
- **Not Configured** - Application Control is not added to devices. However, settings that were previously added continue to be enforced on assigned devices.
1025+
- **Not Configured** - Application Control isn't added to devices. However, settings that were previously added continue to be enforced on assigned devices.
10261026

10271027
- **Audit only** - Applications aren't blocked. All events are logged in the local client's logs.
10281028

@@ -1173,7 +1173,7 @@ Block end-user access to the various areas of the Microsoft Defender Security Ce
11731173
Turn Tamper Protection on or off on devices. To use Tamper Protection, you must [integrate Microsoft Defender for Endpoint with Intune](advanced-threat-protection.md), and have [Enterprise Mobility + Security E5 Licenses](../fundamentals/licenses.md).
11741174
- **Not configured** - No change is made to device settings.
11751175
- **Enabled** - Tamper Protection is turned on and restrictions are enforced on devices.
1176-
- **Disabled** - Tamper Protection is turned off and restrictions are not enforced.
1176+
- **Disabled** - Tamper Protection is turned off and restrictions aren't enforced.
11771177

11781178
### IT contact Information
11791179

@@ -1280,7 +1280,7 @@ Use these options to configure the local security settings on Windows 10/11 devi
12801280
**Default**: Not configured
12811281
CSP: [Devices_RestrictCDROMAccessToLocallyLoggedOnUserOnly](/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions)
12821282

1283-
- **Enabled** - Only the interactively logged-on user can use the CD-ROM media. If this policy is enabled, and no one is logged on interactively, then the CD-ROM is accessed over the network.
1283+
- **Enabled** - Only the interactively logged-on user can use the CD-ROM media. If this policy is enabled and no one is logged on interactively, then the CD-ROM is accessed over the network.
12841284
- **Not configured** - Anyone has access to the CD-ROM.
12851285

12861286
- **Format and eject removable media**
@@ -1465,8 +1465,8 @@ Use these options to configure the local security settings on Windows 10/11 devi
14651465
LocalPoliciesSecurityOptions CSP: [Shutdown_AllowSystemToBeShutDownWithoutHavingToLogOn](/windows/client-management/mdm/policy-csp-localpoliciessecurityoptions)
14661466

14671467

1468-
- **Block** - Hide the shutdown option on the Windows sign in screen. Users must sign in to the device, and then shut down.
1469-
- **Not configured** - Allow users to shut down the device from the Windows sign in screen.
1468+
- **Block** - Hide the shutdown option on the Windows sign-in screen. Users must sign in to the device, and then shut down.
1469+
- **Not configured** - Allow users to shut down the device from the Windows sign-in screen.
14701470

14711471
### User account control
14721472

0 commit comments

Comments
 (0)