Skip to content

Commit dbe0feb

Browse files
committed
Merge branch 'main' of https://github.com/microsoftdocs/memdocs-pr into oob-14337387-new-diagnostic-data
2 parents 5d995b8 + aa373ba commit dbe0feb

196 files changed

Lines changed: 3126 additions & 2245 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

.openpublishing.redirection.json

Lines changed: 39 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,44 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "memdocs/intune/fundamentals/end-user-company-portal-messages.md",
5+
"redirect_url": "/mem/intune/user-help/sign-in-to-the-company-portal",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path": "memdocs/intune/user-help/your-device-is-noncompliant-cant-evaluate.md",
10+
"redirect_url": "/mem/intune/user-help/",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path": "memdocs/intune/user-help/you-need-to-update-your-company-portal-app-windows.md",
15+
"redirect_url": "/mem/intune/user-help/install-a-new-version-of-the-company-portal-app",
16+
"redirect_document_id": false
17+
},
18+
{
19+
"source_path": "memdocs/intune/user-help/what-happens-if-you-install-the-Company-Portal-app-and-enroll-your-device-in-intune-ios.md",
20+
"redirect_url": "/mem/intune/user-help/use-managed-devices-to-get-work-done",
21+
},
22+
{
23+
"source_path": "memdocs/intune/user-help/how-to-set-the-period-before-your-android-device-is-locked.md",
24+
"redirect_url": "/mem/intune/user-help/set-the-amount-of-time-before-your-device-is-locked-android",
25+
"redirect_document_id": false
26+
},
27+
{
28+
"source_path": "memdocs/intune/user-help/how-to-reconnect-a-compromised-android-device.md",
29+
"redirect_url": "/mem/intune/user-help/your-device-is-rooted-and-you-cant-connect-android",
30+
"redirect_document_id": false
31+
},
32+
{
33+
"source_path": "memdocs/intune/user-help/how-to-encrypt-your-windows-device.md",
34+
"redirect_url": "https://support.microsoft.com/windows/turn-on-device-encryption-0c453637-bc88-5f74-5105-741561aae838",
35+
"redirect_document_id": false
36+
},
37+
{
38+
"source_path": "memdocs/intune/fundamentals/end-user-mam-apps-android.md",
39+
"redirect_url": "/mem/intune/user-help/use-managed-apps-on-your-device-android",
40+
"redirect_document_id": true
41+
},
342
{
443
"source_path": "memdocs/intune/configuration/vpn-settings-windows-phone-8-1.md",
544
"redirect_url": "https://support.microsoft.com/windows/windows-phone-8-1-end-of-support-faq-7f1ef0aa-0aaf-0747-3724-5c44456778a3",

memdocs/analytics/troubleshoot.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ For Intune or co-managed devices configured with the Intune data collection poli
8181

8282
For Configuration Manager-managed devices:
8383
1. Ensure all devices you want to see performance data are [enrolled](enroll-configmgr.md#bkmk_cm_enroll).
84-
1. Check if the data upload from Configuration Manager to the Gateway Service was successful by looking at the error messages on the **UXAnalyticsUploadWorker.log** file on the site server.
84+
1. Check if the data upload from Configuration Manager to the Gateway Service was successful by looking at the error messages on the **UXAnalyticsUploadWorker.log** file on the site system hosting Service Connection Point role.
8585
1. Check if an admin has custom overrides for client settings. In the Configuration Manager console, go to the **Devices** workspace, find the target devices, and in the **Client settings** group, select the **Resultant client settings**. If endpoint analytics is disabled, there's an overriding client setting. Find the overriding client settings and enable endpoint analytics on it.
8686
1. Check if missing client devices are sending data to the site server by reviewing the **SensorEndpoint.log** file located in `C:\Windows\CCM\Logs\` on client devices. Look for *Message sent* messages.
8787
1. Check and resolve any errors occurring during processing of the boot events by reviewing the **SensorManagedProvider.log** file located in `C:\Windows\CCM\Logs\` on client devices.

memdocs/autopilot/add-devices.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -43,6 +43,9 @@ This article provides step-by-step guidance for manual registration. For more in
4343

4444
Device enrollment requires *Intune Administrator* or *Policy and Profile Manager* permissions. You can also create a custom Autopilot device manager role by using [role-based access control](../intune/fundamentals/role-based-access-control.md). Autopilot device management requires only that you enable all permissions under **Enrollment programs**, except for the four token management options.
4545

46+
> [!NOTE]
47+
> In both Intune Administrator and role-based access control methods, the administrative user also requires consent to use the Microsoft Intune PowerShell enterprise application.
48+
4649
## Collect the hardware hash
4750

4851
The following methods are available to harvest a hardware hash from existing devices:

memdocs/autopilot/bitlocker.md

Lines changed: 36 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -1,54 +1,73 @@
11
---
22
title: Setting the BitLocker encryption algorithm for Autopilot devices
33
description: Microsoft Intune provides a comprehensive set of configuration options to manage BitLocker on Windows devices.
4-
keywords: Autopilot, BitLocker, encryption, 256-bit, Windows 10
54
ms.prod: w10
6-
ms.mktglfcycl: deploy
7-
ms.sitesec: library
8-
ms.pagetype: deploy
95
ms.localizationpriority: medium
10-
audience: itpro
116
author: aczechowski
127
ms.author: aaroncz
138
ms.reviewer: jubaptis
149
manager: dougeby
15-
ms.date: 12/16/2020
10+
ms.date: 06/15/2022
1611
ms.collection: M365-modern-desktop
1712
ms.topic: how-to
1813
---
1914

20-
2115
# Setting the BitLocker encryption algorithm for Autopilot devices
2216

2317
**Applies to**
2418

2519
- Windows 11
2620
- Windows 10
2721

28-
With Windows Autopilot, you can configure BitLocker encryption settings to get applied before automatic encryption starts. This configuration makes sure the default encryption algorithm isn't applied automatically. Other BitLocker policies can also be applied before automatic BitLocker encryption begins.
22+
BitLocker [automatically encrypts](/windows-hardware/design/device-experiences/oem-bitlocker#bitlocker-automatic-device-encryption) internal drives during the out of box experience (OOBE) for devices that support [Modern Standby](/windows-hardware/design/device-experiences/modern-standby) or meet the [Hardware Security Testability Specification (HSTI)](/windows-hardware/test/hlk/testref/hardware-security-testability-specification). By default, BitLocker uses XTS-AES 128-bit used space only for automatic encryption.
23+
24+
With Windows Autopilot, you can configure BitLocker encryption settings to apply before automatic encryption starts. This configuration makes sure the default encryption algorithm or type isn't applied automatically. A device that receives these settings after encrypting automatically will need to be decrypted before changing the encryption algorithm.
25+
26+
## Encryption algorithm
27+
28+
The BitLocker encryption algorithm is used when BitLocker is first enabled. During Autopilot, BitLocker will be enabled after the device setup portion of the [enrollment status page](enrollment-status.md). The following encryption algorithms are available:
2929

30-
The BitLocker encryption algorithm is used when BitLocker is first enabled. The algorithm sets the strength for full volume encryption. Available encryption algorithms are: AES-CBC 128-bit, AES-CBC 256-bit, XTS-AES 128-bit, or XTS-AES 256-bit encryption. The default value is XTS-AES 128-bit encryption. See [BitLocker CSP](/windows/client-management/mdm/bitlocker-csp) for information about the recommended encryption algorithms to use.
30+
- AES-CBC 128-bit
31+
- AES-CBC 256-bit
32+
- XTS-AES 128-bit (default)
33+
- XTS-AES 256-bit
34+
35+
For more information about the recommended encryption algorithms to use, see [BitLocker CSP](/windows/client-management/mdm/bitlocker-csp).
3136

3237
To make sure the BitLocker encryption algorithm you want is set before automatic encryption occurs for Autopilot devices:
3338

34-
1. Configure the [encryption method settings](../intune/protect/endpoint-protection-windows-10.md#windows-encryption) in the Windows Endpoint Protection profile to the encryption algorithm you want.
39+
1. Configure the [encryption method settings](../intune/protect/encrypt-devices.md#create-an-endpoint-security-policy-for-bitlocker) in the Endpoint Security disk encryption policy. The settings are available under **Endpoint Security** > **Disk encryption** > **Create policy** > **Platform** = Windows 10 and later, **Profile type** = BitLocker.
40+
3541
2. [Assign the policy](../intune/configuration/device-profile-assign.md) to your Autopilot device group. The encryption policy must be assigned to **devices** in the group, not users.
36-
3. Enable the Autopilot [Enrollment Status Page](enrollment-status.md) (ESP) for these devices. If the ESP isn't enabled, the policy won't apply before encryption starts.
3742

38-
An example of Microsoft Intune Windows Encryption settings is shown below.
43+
3. Enable the Autopilot [enrollment status page](enrollment-status.md) for these devices. If you don't enable this feature, the policy won't apply before encryption starts.
44+
45+
The following image is an example of the Endpoint Security disk encryption settings.
3946

40-
![BitLocker encryption settings.](images/bitlocker-encryption.png)
47+
:::image type="content" source="media/bitlocker/endpoint-security-disk-encryption-policy.png" alt-text="Screenshot example of the Endpoint Security disk encryption settings.":::
4148

42-
A device that is encrypted automatically will need to be decrypted before changing the encryption algorithm.
49+
## Full disk or used space-only encryption
4350

44-
The settings are available under **Device Configuration** > **Profiles** > **Create profile** > **Platform** = Windows 10 and later, Profile type = Endpoint protection > **Configure** > **Windows Encryption** > **BitLocker base settings**, Configure encryption methods = Enable.
51+
There are two types of encryption, full disk or used space-only. The type of encryption is automatically determined by configuration of [silent enablement](../intune/protect/encrypt-devices.md#silently-enable-bitlocker-on-devices) and hardware support for modern standby. You can enforce it by configuring the [SystemDrivesEncryptionType](/windows/client-management/mdm/bitlocker-csp) setting. Like the encryption algorithm, the encryption type is used when BitLocker is first enabled. For more information on the expected encryption type behavior, see [Manage BitLocker policy](../intune/protect/encrypt-devices.md#full-disk-vs-used-space-only-encryption).
4552

46-
It's also recommended to set **Windows Encryption** > **Windows Settings** > **Encrypt** = Require.
53+
To enforce the type of drive encryption used:
54+
55+
1. Configure the **Enforce drive encryption type on operating system drives** setting within the [settings catalog](../intune/configuration/settings-catalog.md). This setting is available in the **Administrative Templates > Windows Components > BitLocker Drive Encryption > Operating System Drives** category from the settings picker.
56+
57+
2. [Assign the policy](../intune/configuration/device-profile-assign.md) to your Autopilot device group. The encryption policy must be assigned to **devices** in the group, not users.
58+
59+
3. Enable the Autopilot [enrollment status page](enrollment-status.md) for these devices. If you don't enable this feature, the policy won't apply before encryption starts.
60+
61+
The following image is an example of the settings catalog profile.
62+
63+
:::image type="content" source="media/bitlocker/settings-catalog-drive-type.png" alt-text="Screenshot example of the BitLocker drive type configuration in the settings catalog.":::
4764

4865
## Requirements
4966

50-
Windows 10, version 1809 or later.
67+
A supported version of Windows 11 or Windows 10.
5168

5269
## Next steps
5370

5471
[BitLocker overview](/windows/security/information-protection/bitlocker/bitlocker-overview)
72+
73+
[Manage BitLocker policy for Windows devices with Intune](../intune/protect/encrypt-devices.md)

memdocs/autopilot/index.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -123,4 +123,4 @@ landingContent:
123123
- text: Windows Autopilot and Surface devices
124124
url: /surface/windows-autopilot-and-surface-devices
125125
- text: Windows Autopilot for HoloLens 2
126-
url: https://docs.microsoft.com/hololens/hololens2-autopilot
126+
url: /hololens/hololens2-autopilot

memdocs/autopilot/known-issues.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,11 @@ This article describes known issues that can often be resolved by configuration
2828

2929
## Known issues
3030

31-
### `DefaultuserX` profile not deleted
31+
### Autopilot profile not being applied when assigned
32+
33+
In Windows 10 April (KB5011831) release, there is an issue where the Autopilot profile may fail to apply to the device. As a result, any settings made in the profile may not be configured for the user such as device renaming. To resolve this issue, the May (KB5015020) cumulative update needs to be applied to the device.
34+
35+
### DefaultuserX profile not deleted
3236

3337
When you use the [EnableWebSignIn CSP](/windows/client-management/mdm/policy-csp-authentication#authentication-enablewebsignin), the `defaultuserX` profile may not be deleted. This CSP isn't currently supported. It's in preview mode only and not recommended for production purposes at this time.
3438

73.7 KB
Loading
23.3 KB
Loading

memdocs/autopilot/windows-autopilot-hybrid.md

Lines changed: 20 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ keywords:
88
author: ErikjeMS
99
ms.author: erikje
1010
manager: dougeby
11-
ms.date: 06/07/2021
11+
ms.date: 06/22/2021
1212
ms.topic: how-to
1313
ms.service: microsoft-intune
1414
ms.subservice: enrollment
@@ -113,12 +113,23 @@ The organizational unit that's granted the rights to create computers must match
113113

114114
## Install the Intune Connector
115115

116-
The Intune Connector for Active Directory must be installed on a computer that's running Windows Server 2016 or later. The computer must also have access to the internet and your Active Directory. To increase scale and availability, you can install multiple connectors in your environment. We recommend installing the Connector on a server that's not running any other Intune connectors. Each connector must be able to create computer objects in any domain that you want to support.
116+
### Before you begin
117117

118-
> [!NOTE]
119-
> If your organization has multiple domains and you install multiple Intune Connectors, you must use a service account that's able to create computer objects in all domains, even if you plan to implement hybrid Azure AD join only for a specific domain. If these are untrusted domains, you must uninstall the connectors from domains in which you don't want to use Windows Autopilot. Otherwise, with multiple connectors across multiple domains, all connectors must be able to create computer objects in all domains.
118+
- The Intune Connector for Active Directory must be installed on a computer that's running Windows Server 2016 or later.
119+
- The computer must have access to the internet and your Active Directory.
120+
- To increase scale and availability, you can install multiple connectors in your environment. We recommend installing the Connector on a server that's not running any other Intune connectors. Each connector must be able to create computer objects in any domain that you want to support.
121+
122+
- If your organization has multiple domains and you install multiple Intune Connectors, you must use a service account that can create computer objects in all domains, even if you plan to implement hybrid Azure AD join only for a specific domain. If these are untrusted domains, you must uninstall the connectors from domains in which you don't want to use Windows Autopilot. Otherwise, with multiple connectors across multiple domains, all connectors must be able to create computer objects in all domains.
123+
124+
This connector service account must have the following permissions:
125+
126+
- **[Log on as a service](/system-center/scsm/enable-service-log-on-sm)**
127+
- Must be part of the **Domain user** group
128+
- Must be a member of the local **Administrators** group on the Windows server that hosts the connector
129+
130+
- The Intune Connector requires the [same endpoints as Intune](../intune/fundamentals/intune-endpoints.md).
120131

121-
The Intune Connector requires the [same endpoints as Intune](../intune/fundamentals/intune-endpoints.md).
132+
### Install steps
122133

123134
1. Turn off IE Enhanced Security Configuration. By default Windows Server has Internet Explorer Enhanced Security Configuration turned on. If you're unable to sign in to the Intune Connector for Active Directory, then turn off IE Enhanced Security Configuration for the Administrator. [How To Turn Off Internet Explorer Enhanced Security Configuration](/archive/blogs/chenley/how-to-turn-off-internet-explorer-enhanced-security-configuration).
124135
2. In the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Devices** > **Windows** > **Windows enrollment** > **Intune Connector for Active Directory** > **Add**.
@@ -131,13 +142,10 @@ The Intune Connector requires the [same endpoints as Intune](../intune/fundament
131142
8. Go to **Devices** > **Windows** > **Windows enrollment** > **Intune Connector for Active Directory**, and then confirm that the connection status is **Active**.
132143

133144
> [!NOTE]
134-
> The Global administrator role is a temporary requirement at the time of installation.
135-
136-
> [!NOTE]
137-
> After you sign in to the Connector, it might take a couple of minutes to appear in the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431). It appears only if it can successfully communicate with the Intune service.
138-
139-
> [!NOTE]
140-
> Inactive Intune connectors will still appear in the Intune Connectors blade and will automatically be cleaned up after 30 days.
145+
>
146+
> - The Global administrator role is a temporary requirement at the time of installation.
147+
> - After you sign in to the Connector, it can take several minutes to appear in the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431). It appears only if it can successfully communicate with the Intune service.
148+
> - Inactive Intune connectors still appear in the Intune Connectors blade and will automatically be cleaned up after 30 days.
141149
142150
### Configure web proxy settings
143151

0 commit comments

Comments
 (0)