Skip to content

Commit e10bd13

Browse files
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/memdocs-pr into Android8Support
2 parents 7ed66ca + 909c1e7 commit e10bd13

6 files changed

Lines changed: 8 additions & 6 deletions

File tree

memdocs/intune/enrollment/device-enrollment-manager-enroll.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ ms.collection:
3333

3434
# Enroll devices in Intune by using a device enrollment manager account
3535

36-
You can enroll up to 1,000 mobile devices with a single Azure Active Directory account by using a device enrollment manager (DEM) account. DEM is an Intune permission that can be applied to an Azure AD user account and lets the user enroll up to 1,000 devices. A DEM account is useful for scenarios where devices are enrolled and prepared before handing them out to the users of the devices. By design, there's a limit of 150 Device Enrollment Manager (DEM) accounts in Microsoft Intune.
36+
You can enroll up to 1,000 devices with a single Azure Active Directory account by using a device enrollment manager (DEM) account. DEM is an Intune permission that can be applied to an Azure AD user account and lets the user enroll up to 1,000 devices. A DEM account is useful for scenarios where devices are enrolled and prepared before handing them out to the users of the devices. By design, there's a limit of 150 Device Enrollment Manager (DEM) accounts in Microsoft Intune.
3737

3838
## Limitations of devices that are enrolled with a DEM account
3939

memdocs/intune/enrollment/enrollment-restrictions-set.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -200,7 +200,6 @@ The following filter properties are always available to use with enrollment poli
200200

201201
* OS version
202202
* Operating System SKU
203-
* Ownership
204203
* Enrollment profile name
205204

206205
**iOS/iPadOS and macOS**

memdocs/intune/enrollment/windows-enrollment-status.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -99,7 +99,7 @@ To turn on the Enrollment Status Page, follow the steps below.
9999
8. Choose **Settings** > *choose the settings you want to apply to this profile* > **Save**.
100100

101101
> [!NOTE]
102-
> Due to OS restrictions, only a subset of filters are available to use when assigning **Enrollment Status Page** policies. The filter picker will only show filters that have rules defined for `osVersion`, `operatingSystemSKU`, `deviceOwnership`, and `enrollmentProfileName` properties. Filters that contain other properties are not shown.
102+
> Due to OS restrictions, only a subset of filters are available to use when assigning **Enrollment Status Page** policies. The filter picker will only show filters that have rules defined for `osVersion`, `operatingSystemSKU`, and `enrollmentProfileName` properties. Filters that contain other properties are not shown.
103103
104104
## Set the enrollment status page priority
105105

memdocs/intune/fundamentals/in-development.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,7 @@ As part of a public preview, you'll soon be able to use the Microsoft Defender f
9090
## Device configuration
9191

9292
### Use Collect diagnostics to collect additional details from Windows 365 devices through Intune remote actions<!-- 12636207 -->
93-
Intunes remote action to [*Collect diagnostics*](../remote-actions/collect-diagnostics.md) will soon collect additional details from Windows 365 (Coud-PC) devices. (**Devices** > **Windows** > *select a Windows 365 device* > **Collect diagnostics**)
93+
Intune's remote action to [*Collect diagnostics*](../remote-actions/collect-diagnostics.md) will soon collect additional details from Windows 365 (Cloud PC) devices. (**Devices** > **Windows** > *select a Windows 365 device* > **Collect diagnostics**)
9494

9595
The new details for Windows 365 devices include the following registry data:
9696
- HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\AddIns\WebRTC Redirector

memdocs/intune/protect/encrypt-devices.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -177,6 +177,9 @@ IT admins need to have a specific permission within Azure Active Directory to be
177177

178178
All BitLocker recovery key accesses are audited. For more information on Audit Log entries, see [Azure portal audit logs](/azure/active-directory/devices/device-management-azure-portal#audit-logs).
179179

180+
> [!NOTE]
181+
> If you delete the Azure AD object for an Azure AD joined device protected by BitLocker, the next time that device syncs with Azure AD it will remove the key protectors for the operating system volume. Removing the key protector leaves BitLocker in a suspended state on that volume. This is necessary because BitLocker recovery information for Azure AD joined devices is attached to the Azure AD computer object and deleting it may leave you unable to recover from a BitLocker recovery event.
182+
180183
### View recovery keys for tenant-attached devices
181184

182185
When you’ve configured the tenant attach scenario, Microsoft Endpoint Manager can display recovery key data for tenant attached devices.

windows-365/enterprise/end-user-access-cloud-pc.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ ms.assetid:
2020
#ROBOTS:
2121
#audience:
2222

23-
ms.reviewer: alcort
23+
ms.reviewer: ivivano
2424
ms.suite: ems
2525
search.appverid: MET150
2626
#ms.tgt_pltfrm:
@@ -75,7 +75,7 @@ For a list of clients by operating system, see [Remote Desktop clients](/windows
7575

7676
To set up their Remote Desktop client, users follow these steps:
7777

78-
1. Download the Remote Desktop app from the Download App page on [www.microsoft.com/windows-365?rtc=1](https://www.microsoft.com/windows-365?rtc=1).
78+
1. Download the Remote Desktop app from the [Remote Desktop clients page](/windows-server/remote/remote-desktop-services/clients/remote-desktop-clients).
7979
2. Select **Subscribe**.
8080
3. Enter their Azure Active Directory credentials.
8181
4. The Cloud PC appears in the list, and they can double-click it to launch.

0 commit comments

Comments
 (0)