Skip to content

Commit e229c48

Browse files
authored
Merge pull request #6231 from MicrosoftDocs/main
11/29/2021 AM Publish
2 parents 65b89dc + e1960df commit e229c48

8 files changed

Lines changed: 61 additions & 10 deletions

memdocs/intune/fundamentals/create-custom-role.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -72,6 +72,7 @@ The following permissions are available when creating custom roles.
7272
| Mobile apps/Update | Manage mobile applications such as store apps, line-of-business apps, web-links or built-in apps. You can also manage books purchased through the Apple Volume Purchase Program or add eBook categories. You can manage iOS VPP Tokens, Windows Symantec certificates, Windows side loading keys, app categories, or the Android for Work connection. |
7373
| Mobile apps/Delete | Delete mobile applications such as store apps, line-of-business apps, web-links or built-in apps. You can also delete books purchased through the Apple Volume Purchase Program or delete eBook categories. You can delete iOS VPP Tokens, Windows Symantec certificates, Windows side loading keys, app categories, or the Android for Work connection. |
7474
| Mobile apps/Assign | Assign mobile applications or eBooks to Azure AD security groups. |
75+
| Mobile apps/Relate | Create relationships with other managed apps using Dependencies and Supersedence features. Without this permission, IT admins are not able to add App dependency or supercedence relationships when creating or editing Win32 apps. |
7576
| Terms and conditions/Create | Create new terms and conditions. |
7677
| Terms and conditions/Read | View terms and conditions. |
7778
| Terms and conditions/Update | Manage existing terms and conditions but not assignments. |

memdocs/intune/protect/antivirus-microsoft-defender-settings-windows-tenant-attach.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ search.appverid: MET150
2424
#ms.tgt_pltfrm:
2525
ms.custom: intune-azure
2626
ms.collection: M365-identity-device-management
27-
ms.reviewer: mattsha
27+
ms.reviewer: mattcall
2828

2929
---
3030

@@ -118,7 +118,7 @@ For each setting in this group, you can expand the setting, select **Add**, and
118118
Configure Defender to allow or disallow Intrusion Prevention functionality.
119119

120120
- **Not configured** (*default*) - The setting is restored to the system default.
121-
- **No** - Intrusion Prevention Systme is not allowed.
121+
- **No** - Intrusion Prevention System is not allowed.
122122
- **Yes** - Intrusion Prevention System is allowed.
123123

124124
- **Scan all downloaded files and attachments**

memdocs/intune/protect/certificate-connector-install.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: brenduns
88
ms.author: brenduns
99
manager: dougeby
10-
ms.date: 08/13/2021
10+
ms.date: 11/29/2021
1111
ms.topic: how-to
1212
ms.service: microsoft-intune
1313
ms.subservice: protect
@@ -101,7 +101,7 @@ Use the following procedure to both configure a new connector and modify a previ
101101
- **SYSTEM**
102102
- **Domain user account** – Use any domain user account that is an administrator on the Windows Server.
103103

104-
4. On the *Proxy* page, add details for your proxy server if you require a proxy for internet access.
104+
4. On the *Proxy* page, add details for your proxy server if you require a proxy for internet access. For example, *http://proxy.contoso.com*.
105105

106106
5. On the *Prerequisites* page, the wizard runs several checks on the server before the configuration can begin. Review and resolve any errors or warnings before you continue.
107107

memdocs/intune/protect/certificates-scep-configure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ To support SCEP, the following on-premises infrastructure must run on servers th
7070
- We recommend you don’t use NDES that's installed on the server that hosts the Enterprise CA. While use of NDES that's installed on an Enterprise CA is supported, this configuration represents a security risk when the CA services internet requests.
7171
- Internet Explorer Enhanced Security Configuration [must be disabled on the server that hosts NDES](/previous-versions/windows/it-pro/windows-server-2003/cc775800(v=ws.10)) and the Microsoft Intune Connector.
7272

73-
To learn more about NDES, see [Network Device Enrollment Service Guidance](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/hh831498(v=ws.11)) in the Windows Server documentation, and [Using a Policy Module with the Network Device Enrollment Service](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn473016(v=ws.11)).
73+
To learn more about NDES, see [Network Device Enrollment Service Guidance](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/hh831498(v=ws.11)) in the Windows Server documentation, and [Using a Policy Module with the Network Device Enrollment Service](/previous-versions/windows/it-pro/windows-server-2012-R2-and-2012/dn473016(v=ws.11)). To learn how to configure high availability for NDES, see [High Availability](/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-cert#high-availability).
7474

7575
#### Support for NDES on the internet
7676

memdocs/intune/protect/includes/security-config-mgt-prerequisites.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: include file
44
author: brenduns
55
ms.service: microsoft-intune
66
ms.author: brenduns
7-
ms.date: 11/22/2021
7+
ms.date: 11/29/2021
88
ms.topic: include
99
---
1010

@@ -109,7 +109,10 @@ To support Microsoft Defender for Endpoint security configuration management thr
109109

110110
Microsoft Defender for Endpoint supports several options to onboard devices. For current guidance, see [Onboarding tools and methods for Windows devices](/microsoft-365/security/defender-endpoint/security-config-management) in the Defender for Endpoint documentation.
111111

112-
Devices that you manage with Intune or Configuration Manager are not supported for this scenario.
112+
> [!IMPORTANT]
113+
> After a device onboards with Microsoft Defender for Endpoint, it must and be tagged with **MDE-Management** before it can enroll with Security Management for Microsoft Defender for Endpoint. For more information on device tagging in MDE, see Create and manage device tags](/microsoft-365/security/defender-endpoint/machine-tag).
114+
115+
Devices that you manage with Intune are not supported for this scenario.
113116

114117
## Create Azure AD Groups
115118

memdocs/intune/protect/mde-security-integration.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -62,6 +62,7 @@ When you select a policy, you'll see information about the device check-in statu
6262
## Known limitations and considerations
6363

6464
### Co-existence with Microsoft Endpoint Configuration Manager
65+
6566
When using Configuration Manager, the best path for management of security policy is using the [Configuration Manager tenant attach](/mem/configmgr/tenant-attach/endpoint-security-get-started). In some environments it may be desired to use Security Management for Microsoft Defender. When using Security Management for Microsoft Defender with Configuration Manager, endpoint security policy should be isolated to a single control plane. Controlling policy through both channels will create the opportunity for conflicts and undesired results.
6667

6768
### Active Directory joined devices

memdocs/intune/remote-actions/remote-help.md

Lines changed: 44 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: brenduns
88
ms.author: brenduns
99
manager: dougeby
10-
ms.date: 11/24/2021
10+
ms.date: 11/29/2021
1111
ms.topic: how-to
1212
ms.service: microsoft-intune
1313
ms.subservice: remote-actions
@@ -70,7 +70,6 @@ The Remote help app supports the following capabilities:
7070
- Windows 10/11
7171
- Devices must install the *remote help* app. Device users can download the app directly from the Microsoft. See [Install and update remote help](#install-and-update-remote-help)
7272

73-
7473
> [!NOTE]
7574
> Remote help has the following limitations:
7675
>
@@ -126,8 +125,50 @@ When an update to remote help that is required, users are prompted to install th
126125
- Intune admins can download and deploy the app to enrolled devices. For more information about app deployments, see [Install apps on Windows devices](../apps/apps-windows-10-app-deploy.md#install-apps-on-windows-10-devices).
127126
- Individual users who have permissions to install apps on their devices can also download and install remote help.
128127

129-
**Download remote help**: Download the latest version of remote help direct from Microsoft at [aka.ms/downloadremotehelp](https://aka.ms/downloadremotehelp).
128+
### Download remote help
129+
130+
Download the latest version of remote help direct from Microsoft at [aka.ms/downloadremotehelp](https://aka.ms/downloadremotehelp).
131+
132+
The most recent version of remote help is **10.0.100110.16384**
133+
134+
### Deploy remote help as a Win32 app
135+
136+
To deploy remote help with Intune, you can add the app as a Windows win32 app, and define a detection rule to identify devices that don’t have the most current version of remote help installed. Before you can add remote help as a Win32 app, you must repackage *remotehelp.exe* as a *.intunewin* file, which is a Win32 app file you can deploy with Intune. For information on how to repackage a file as a Wind32 app, see [Prepare the Win32 app content for upload](../apps/apps-win32-prepare.md).
137+
138+
After you repackage remote help as a *.intunewinfile*, use the procedures in [Add a Win32 app](../apps/apps-win32-add.md ) with the following details to upload and deploy remote help. In the following, the repackaged remotehelp.exe file is named *remotehelp.intunewin*.
139+
140+
1. On the App information page, click **Select app package file**, and locate the *remotehelp.intunewin* file you’ve previously prepared, and then select **OK**.
141+
142+
Add a *Publisher* and then select **Next**. The additional details on the App Information page are optional.
143+
144+
2. On the Program page, configure the following options:
145+
146+
- For *Install command line*, specify **remotehelp.exe /install /quiet acceptTerms=Yes**
147+
- For *Uninstall command line*, specify **remotehelp.exe/ uninstall /quiet acceptTerms=Yes**
148+
149+
> [!IMPORTANT]
150+
> The command line option *acceptTerms* is always case sensitive.
151+
152+
You can leave the remainder of the options at their default values and select **Next** to continue.
153+
154+
3. On the Requirements page, configure the following options to meet your environment, and then select **Next**:
155+
156+
- *Operating system architecture*
157+
- *Minimum operating system*
158+
159+
4. On the Detection rules page, for *Rules format*, select **Manually configure detection rules**, and then select **Add** to open the *Detection rule* pane. Configure the following options:
160+
161+
- For *Rule type*, select **File**
162+
- For *Path*, specify **C:\Program Files\Remote Help**
163+
- For *File or folder*, specify **RemoteHelp.exe**
164+
- For *Detection method*, select **String (version)**
165+
- For *Operator*, select **Greater than or equal to**
166+
- For *Value*, specify the [version of remote help](#download-remote-help) your deploying. For example, **10.0.10011.16384**
167+
- Leave *Associated with a 32-bit app on 64-bit clients* set to **No**
168+
169+
5. Proceed to the Assignments page, and then select an applicable device group or groups that should install the remote help app.
130170

171+
6. Complete creation of the Windows app to have Intune deploy and install remote help on applicable devices.
131172

132173
## Configure remote help for your tenant
133174

windows-365/enterprise/device-management-overview.md

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -81,6 +81,11 @@ If a user has multiple Windows 365 SKUs assigned to them, they’ll get multiple
8181
If the grace period was triggered in error, you have seven days to resolve the breaking change to get the Cloud PC switched back to **Provisioned**.
8282

8383
You can manually end the grace period by using the [End grace period](end-grace-period.md) option.
84+
- **Pending**: If there are not enough available licenses in your tenant to process the provisioning request, new Cloud PCs are marked as **Pending**.
85+
86+
Your Windows 365 tenant can only have as many active Cloud PCs as the license allocation allows. An active Cloud PC can either be in a **Provisioned** or **In grace period** state.
87+
88+
To begin provisioning on Pending Cloud PCs, free up some Windows 365 licenses or end grace period on Cloud PCs in the grace period state.
8489

8590
**User**: The user assigned to the Cloud PC.
8691

0 commit comments

Comments
 (0)