You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: memdocs/autopilot/autopilot-mbr.md
-4Lines changed: 0 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -180,10 +180,6 @@ To reregister an Autopilot device from Intune, an IT Admin would:
180
180
2. Navigate to Device enrollment > Windows enrollment > Devices > Import.
181
181
3. Click the **Import** button to upload a csv file containing the device ID of the device to be reregistered. The device ID was the 4K HH captured by the PowerShell script or OA3 tool described previously in this document.
182
182
183
-
The following video provides a good overview of how to (re)register devices via MSfB.<br>
Copy file name to clipboardExpand all lines: memdocs/autopilot/enrollment-autopilot.md
+2-3Lines changed: 2 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -52,13 +52,12 @@ ms.collection:
52
52
53
53
-**Group type**: Select **Security**.
54
54
-**Group name** and **Group description**: Enter a name and description for your group.
55
-
-**Azure AD roles can be assigned to the group**: **Yes** allows Azure AD roles to be assigned to the group you're creating. Once set, the group is permanently and always allowed to be assigned Azure AD roles. When set to**No**, Azure AD roles aren't assigned to this group.
55
+
-**Azure AD roles can be assigned to the group**: Select**No**, Azure AD roles aren't assigned to this group.
56
56
57
57
For more information, see [Use cloud groups to manage role assignments in Azure AD](/azure/active-directory/roles/groups-concept).
58
58
59
-
-**Membership type**: Choose how devices become members of this group. Select **Assigned**, **Dynamic user**, or **Dynamic Device**. For more information, see [Add groups to organize users and devices](../intune/fundamentals/groups-add.md).
59
+
-**Membership type**: Choose how devices become members of this group. Select **Dynamic Device**. For more information, see [Add groups to organize users and devices](../intune/fundamentals/groups-add.md).
60
60
-**Owners**: Select users that own the group. Owners can also delete this group.
61
-
-**Members**: Select Autopilot devices that belong to this group. Autopilot devices that aren't enrolled show the serial number for the device name.
Create rules using Autopilot device attributes. Autopilot devices that meet these rules are automatically added to the group. Creating an expression using non-autopilot attributes doesn't guarantee that devices included in the group are registered to Autopilot.
Copy file name to clipboardExpand all lines: memdocs/autopilot/networking-requirements.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ author: aczechowski
13
13
ms.author: aaroncz
14
14
ms.reviewer: jubaptis
15
15
manager: dougeby
16
-
ms.date: 08/23/2021
16
+
ms.date: 08/23/2022
17
17
ms.collection:
18
18
- M365-modern-desktop
19
19
- highpri
@@ -132,7 +132,7 @@ Some of these services will also need to check certificate revocation lists (CRL
132
132
133
133
The device can be hybrid Azure AD joined. The computer should be on the internal network for hybrid Azure AD join to work. For more information, see [Windows Autopilot user-driven mode](user-driven.md#user-driven-mode-for-hybrid-azure-ad-join).
134
134
135
-
### <aname="tpm"></a> Autopilot self-Deploying mode and Autopilot pre-provisioning
135
+
### <aname="tpm"></a> Autopilot self-deploying mode and Autopilot pre-provisioning
136
136
137
137
The TPM attestation process requires access to a set of HTTPS URLs, which are unique for each TPM provider. Ensure access to this URL pattern: `*.microsoftaik.azure.net`.
Copy file name to clipboardExpand all lines: memdocs/autopilot/self-deploying.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -71,7 +71,7 @@ Optionally, you can use a [device-only subscription](https://techcommunity.micro
71
71
Self-deploying mode uses a device's TPM 2.0 hardware to authenticate the device into an organization's Azure AD tenant. Therefore, devices without TPM 2.0 can't be used with this mode. Devices must also support TPM device attestation. All new Windows devices should meet these requirements. The TPM attestation process also requires access to a set of HTTPS URLs that are unique for each TPM provider. For more information, see the entry for Autopilot self-Deploying mode and Autopilot pre-provisioning in [Networking requirements](networking-requirements.md#tpm). For Windows Autopilot software requirements, see [Windows Autopilot software requirements](./software-requirements.md).
72
72
73
73
> [!IMPORTANT]
74
-
> If you attempt a self-deploying mode deployment on a device that does not have support TPM 2.0 or on a virtual machine, the process will fail when verifying the device with an 0x800705B4 timeout error (Hyper-V virtual TPMs are not supported). Also note that Windows 10, version 1903 or later is required to use self-deploying mode due to issues with TPM device attestation in Windows 10, version 1809. Since Windows 10 Enterprise 2019 LTSC is based on Windows 10 version 1809, self-deploying mode is also not supported on Windows 10 Enterprise 2019 LTSC.
74
+
> If you attempt a self-deploying mode deployment on a device that does not have support TPM 2.0 or on a virtual machine, the process will fail when verifying the device with an 0x800705B4 timeout error (Hyper-V virtual TPMs are not supported). Also note that Windows 10, version 1903 or later is required to use self-deploying mode due to issues with TPM device attestation in Windows 10, version 1809.
75
75
>
76
76
> See [Windows Autopilot known issues](known-issues.md) and [Troubleshoot Autopilot device import and enrollment](troubleshoot-device-enrollment.md) to review other known errors and solutions.
Copy file name to clipboardExpand all lines: memdocs/autopilot/windows-autopilot-whats-new.md
+5-1Lines changed: 5 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,10 +17,14 @@ ms.topic: article
17
17
18
18
# Windows Autopilot: What's new
19
19
20
+
## Updates to Autopilot device targeting infrastructure
21
+
22
+
With Intune 2208 we are updating the Autopilot infrastructure to ensure that the profiles and applications assigned are consistently ready when the devices are deployed. This change reduces the amount of data that needs to be synchronized per-Autopilot device and leverages device lifecycle change events to reduce the amount of time that it takes to recover from device resets for Azure AD and Hybrid Azure AD joined devices. No action is needed to enable this change, it will be rolling out to all clients starting August 2022.
23
+
20
24
## Update Intune Connector for Active Directory for Hybrid Azure AD joined devices
21
25
<!-- 2209 -->
22
26
23
-
Starting in September 2022, the Intune Connector for Active Directory (ODJ connector) will require .NET Framework version 4.7.2 or later. If you're not already using .NET 4.7.2 or later, the Intune Connector may not work for Autopilot hybrid Azure AD deployments and will result in failures. When you install a new Intune Connector, don't use the connector installation package that was previously downloaded. Download a new version from the **Intune Connector for Active Directory** section of the Microsoft Endpoint Manager admin center. If you're not using the latest version, it may continue to work, but the auto-upgrade feature to provide updates to the Intune Connector won't work.
27
+
Starting in September 2022, the Intune Connector for Active Directory (ODJ connector) will require .NET Framework version 4.7.2 or later. If you're not already using .NET 4.7.2 or later, the Intune Connector may not work for Autopilot hybrid Azure AD deployments and will result in failures. When you install a new Intune Connector, don't use the connector installation package that was previously downloaded. Before you install a new connector, update the .NET Framework to version 4.7.2 or later. Download a new version from the **Intune Connector for Active Directory** section of the Microsoft Endpoint Manager admin center. If you're not using the latest version, it may continue to work, but the auto-upgrade feature to provide updates to the Intune Connector won't work.
Copy file name to clipboardExpand all lines: memdocs/cloud-native-windows-endpoints.md
-1Lines changed: 0 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -274,7 +274,6 @@ Your cloud-native endpoint will need some applications. To get started, we recom
274
274
275
275
- Select **configuration designer** for the settings format, as opposed to XML.
276
276
- Select **Current Channel** for the update channel.
277
-
- Ensure that you de-select (uncheck) the option for **OneDrive (Groove)** as this app is the legacy OneDrive. Because OneDrive is included with Windows, it isn't mandatory to install it. Remove other applications you don't want installed by unchecking them.
278
277
279
278
To deploy Microsoft 365 Apps, go to [Add Microsoft 365 apps to Windows devices using Microsoft Intune](./intune/apps/apps-add-office365.md)
Copy file name to clipboardExpand all lines: memdocs/configmgr/compliance/deploy-use/create-custom-configuration-items-for-windows-desktop-and-server-computers-managed-with-the-client.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,7 @@
2
2
title: Create custom configuration items
3
3
titleSuffix: Configuration Manager
4
4
description: Manage settings for Windows computers and servers with a custom configuration item for Windows desktops and servers
5
-
ms.date: 03/10/2022
5
+
ms.date: 08/12/2022
6
6
ms.prod: configuration-manager
7
7
ms.technology: configmgr-compliance
8
8
ms.topic: conceptual
@@ -227,8 +227,8 @@ The value returned by the script is used to assess the compliance of the global
227
227
-**Run scripts by using the logged on user credentials**: If you enable this option, the script runs on client computers that use the credentials of the signed-in user.
228
228
229
229
> [!IMPORTANT]
230
-
> When using a signed PowerShell script, ensure you select **Open**. You can't use copy and paste for a signed script. <!--8538617-->
231
-
230
+
> -When using a signed PowerShell script, ensure you select **Open**. You can't use copy and paste for a signed script. <!--8538617-->
231
+
> - Starting in 2207, you can define a **Script Execution Timeout (seconds)** when configuring [client settings](../../core/clients/deploy/about-client-settings.md#compliance-settings) for compliance settings. <!--14120481-->
0 commit comments