You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: memdocs/intune/protect/compliance-use-custom-settings.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -42,9 +42,9 @@ Before you can add custom settings to a policy, you’ll need to prepare the Pow
42
42
43
43
- The PowerShell script runs on a device to discover and report on the settings defined in the JSON. You upload scripts to the Microsoft Endpoint Manager admin center before you create a policy, and then select a single script when configuring the policy. The policy assigns the script to the device at the time the policy is evaluated. Each compliance policy supports a single script, and each script can detect multiple settings.
44
44
45
-
- The JSON file defines the settings you want to base your custom compliance on, and the acceptable values for those settings. You can also configure messages for device users for how to restore compliance for each setting. You’ll upload the file when you create a compliance policy that will include custom compliance settings.
45
+
- The JSON file defines the settings you want to base your custom compliance on, and the acceptable values for those settings. You can also configure messages for users to tell them how to restore compliance for each setting. You will upload the file when you create a compliance policy that includes custom compliance settings.
46
46
47
-
After you’ve deployed custom compliance settings and devices have reported back, you’ll be able to view the results alongside the built-in compliance setting details in the Microsoft Endpoint Manager admin center. Custom compliance settings will be used for conditional access decisions, the same way built-in compliance settings are. Together they form a compound rule set, equally affecting the device compliance state.
47
+
After you’ve deployed custom compliance settings and devices have reported back, you will be able to view the results alongside the built-in compliance setting details in the Microsoft Endpoint Manager admin center. Custom compliance settings can be used for conditional access decisions, the same way built-in compliance settings are. Together they form a compound rule set, equally affecting the device compliance state.
48
48
49
49
## Prerequisites
50
50
@@ -54,11 +54,11 @@ After you’ve deployed custom compliance settings and devices have reported bac
54
54
55
55
Devices that are not Azure AD joined or are not hybrid Azure AD-joined are evaluated as not applicable.
56
56
57
-
-**PowerShell discovery script** - This is a script that you create that runs on a device to discover the custom settings defined in your JSON file and returns the configuration value of those settings to Intune. You’ll upload your script to the Microsoft Endpoint Manager admin center before you create a compliance policy and then select the script you want to use when creating a policy.
57
+
-**PowerShell discovery script** - This is a script that you create that runs on a device to discover the custom settings defined in your JSON file and returns the configuration value of those settings to Intune. You need to upload your script to the Microsoft Endpoint Manager admin center before you create a compliance policy and then select the script you want to use when creating a policy.
58
58
59
59
To create a custom compliance script, see [Custom PowerShell scripts for discovery](../protect/compliance-custom-script.md).
60
60
61
-
-**JSON file** - The JSON file defines the custom settings and the value that is to be considered as compliant and can contain messages for users on how to restore the device to compliance for the setting. You’ll upload your JSON file while creating a compliance policy, just after you select a discovery script for that policy.
61
+
-**JSON file** - The JSON file defines the custom settings and the value that is to be considered as compliant and can contain messages for users on how to restore the device to compliance for the setting. You upload your JSON file while creating a compliance policy, just after you select a discovery script for that policy.
62
62
63
63
To create a JSON file for compliance, see [Custom compliance JSON files](../protect/compliance-custom-json.md)
64
64
@@ -74,7 +74,7 @@ Before starting:
74
74
75
75
### Configure custom compliance settings
76
76
77
-
During the workflow to create a compliance policy, on the *Compliance settings* page:
77
+
During the workflow to create a compliance policy:
78
78
79
79
1. On the *Compliance settings* page, expand the *Custom Compliance* category.
80
80
@@ -94,8 +94,8 @@ During the workflow to create a compliance policy, on the *Compliance settings*
94
94
> - Checking for new or updated PowerShell scripts every eight hours.
95
95
> - Running the discovery scripts every eight hours.
96
96
> - Running scripts that download when a user selects Check Compliance on the device. However, there is no check for new or updated scripts when Check Compliance is run.
97
-
> - Don't support push notifications to enable custom compliance to run on demand.
98
-
>
97
+
>
98
+
>It is not possible to push notifications to a device to enable custom compliance to run on demand.
99
99
100
100
## Monitor custom compliance policy
101
101
@@ -122,7 +122,7 @@ Refresh the current view. If the issue persists, cancel the policy creation flow
122
122
123
123
### After fixing an issue on a device, subsequent syncs don’t identify the issue as resolved and compliant
124
124
125
-
It can take up to eight hours before a noncompliant status for a device update to show compliance.
125
+
It can take up to eight hours before a noncompliant status shows as compliant after a change to the device.
126
126
127
127
### Can a user manually check for compliance after fixing an issue on a device in order to identify if the issue is resolved and compliant?
Copy file name to clipboardExpand all lines: memdocs/intune/protect/microsoft-tunnel-monitor.md
+18-4Lines changed: 18 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ keywords:
5
5
author: brenduns
6
6
ms.author: brenduns
7
7
manager: dougeby
8
-
ms.date: 08/23/2021
8
+
ms.date: 06/23/2022
9
9
ms.topic: how-to
10
10
ms.service: microsoft-intune
11
11
ms.subservice: protect
@@ -164,7 +164,7 @@ Microsoft Tunnel logs information to the Linux server logs in the *syslog* forma
164
164
165
165
Command line examples for *journalctl*:
166
166
167
-
- To view information for only the tunnel server, run `journalctl -t ocserv`.
167
+
- To view information for only the tunnel server, run `journalctl -t ocserv`.
168
168
- To view information for all log options, you can run `journalctl -t ocserv -t ocserv-access -t mstunnel-agent -t mstunnel_monitor`.
169
169
- Add `-f` to the command to display an active and continuing view of the log file. For example, to actively monitor ongoing processes for Microsoft Tunnel, run `journalctl -t mstunnel_monitor -f`.
170
170
@@ -173,8 +173,22 @@ More options for *journalctl*:
173
173
-`journalctl -h` – Display command help for *journalctl*.
-`man journalctl.conf` Display information on configuration
176
-
For more information about *journalctl*, see the documentation for the version of Linux that you use.
177
-
<!-- Pending ocserv-access -->
176
+
For more information about *journalctl*, see the documentation for the version of Linux that you use.
177
+
178
+
## Known issues
179
+
180
+
The following are known issues for Microsoft Tunnel.
181
+
182
+
### Devices fail to connect to the Tunnel server
183
+
184
+
**Issue**: Devices fail to connect to the server, and the Tunnel server *ocserv* log file contains an entry similar to the following: `main: tun.c:655: Can't open /dev/net/tun: Operation not permitted`
185
+
186
+
For guidance on viewing Tunnel logs, see [View Microsoft Tunnel logs](#view-microsoft-tunnel-logs) in this article.
187
+
188
+
**Workaround**: Restart the server using `mst-cli server restart` after the Linux server reboots.
189
+
190
+
If this issue persists, consider automating the restart command by using the cron scheduling utility. See [How to use cron on Linux](https://opensource.com/article/21/7/cron-linux) at *opensource.com*.
0 commit comments