Skip to content

Commit e6613c4

Browse files
committed
Merge branch 'main' into release-intune-2207
2 parents 1336a3a + 22d6030 commit e6613c4

8 files changed

Lines changed: 26 additions & 12 deletions

memdocs/configmgr/protect/deploy-use/endpoint-protection-configure-standalone-client.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,9 @@ ms.localizationpriority: medium
1818

1919
Your organization may have a number of standalone clients that you cannot manage or protect with Microsoft Endpoint Configuration Manager. Without any endpoint protection in place, these standalone clients are vulnerable to potential malware attacks. To protect such standalone clients, you can manually configure them with Endpoint Protection, as described in this topic.
2020

21+
> [!NOTE]
22+
> If you install the endpoint protection client on a device that's not managed by Configuration Manager, a [Management License (ML)](https://www.microsoft.com/licensing/product-licensing/client-access-license) may be required for the device.
23+
2124
To configure Endpoint Protection on a standalone client manually:
2225

2326
- [Create an antimalware policy for the standalone client](#create-an-antimalware-policy-for-the-standalone-client)

memdocs/intune/configuration/device-profile-assign.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -2,12 +2,12 @@
22
# required metadata
33

44
title: Assign device profiles in Microsoft Intune
5-
description: Use the Microsoft Endpoint Manager admin center to assign device profiles and policies to users and devices. Learn how to exclude groups from a profile assignment in Microsoft Intune.
5+
description: Use the Microsoft Endpoint Manager admin center to assign device configuration profiles and policies to users and devices. Learn how to exclude groups from a profile assignment in Microsoft Intune.
66
keywords:
77
author: MandiOhlinger
88
ms.author: mandia
99
manager: dougeby
10-
ms.date: 01/18/2022
10+
ms.date: 07/21/2022
1111
ms.topic: how-to
1212
ms.service: microsoft-intune
1313
ms.subservice: configuration
@@ -30,11 +30,13 @@ ms.collection:
3030
- highpri
3131
---
3232

33-
# Assign user and device profiles in Microsoft Intune
33+
# Assign user and device configuration profiles in Microsoft Intune
3434

35-
You create a profile, and it includes all the settings you entered. The next step is to deploy or "assign" the profile to your user or device groups. When it's assigned, the users and devices receive your profile, and the settings you entered are applied.
35+
You create a device configuration profile, and it includes all the settings you entered. The next step is to deploy or "assign" the profile to your user or device groups. When it's assigned, the users and devices receive your profile, and the settings you entered are applied.
3636

37-
This article shows you how to assign a profile, and includes some information on using scope tags on your profiles.
37+
This article shows you how to assign a profile, and includes some information on using scope tags on your device configuration profiles.
38+
39+
For information on device configuration profiles, and what you can configure, go to [Apply features and settings on your devices using device profiles in Microsoft Intune](device-profiles.md).
3840

3941
> [!NOTE]
4042
> When a profile is removed or no longer assigned to a device, different things can happen, depending on the settings in the profile. The settings are based on CSPs, and each CSP can handle the profile removal differently. For example, a setting might keep the existing value, and not revert back to a default value. The behavior is controlled by each CSP in the operating system. For a list of Windows CSPs, see [configuration service provider (CSP) reference](/windows/client-management/mdm/configuration-service-provider-reference).
@@ -117,7 +119,6 @@ As a best practice:
117119

118120
For more information on groups, see [Add groups to organize users and devices](../fundamentals/groups-add.md).
119121

120-
121122
### Fundamentals
122123

123124
When you assign your policies and profiles, apply the following general principles:

memdocs/intune/configuration/email-settings-android-enterprise.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: MandiOhlinger
88
ms.author: mandia
99
manager: dougeby
10-
ms.date: 03/07/2022
10+
ms.date: 07/21/2022
1111
ms.topic: conceptual
1212
ms.service: microsoft-intune
1313
ms.subservice: configuration
@@ -43,6 +43,9 @@ As an Intune administrator, you can create and assign email settings to Android
4343

4444
- Create an [Android Enterprise email device configuration profile](email-settings-configure.md) > **Personally-owned work profile**.
4545
- Or, create an [app configuration policy](../apps/app-configuration-policies-use-android.md).
46+
- If your profile will use Gmail and you want to use modern authentication, then you may have to deploy the Google Chrome app to the work profile.
47+
48+
For more specific information, go to [Add Android store apps to Microsoft Intune](../apps/store-apps-android.md) and [Assign apps to groups with Microsoft Intune](../apps/apps-deploy.md).
4649

4750
## Android Enterprise
4851

memdocs/intune/configuration/settings-catalog-printer-provisioning.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: MandiOhlinger
88
ms.author: mandia
99
manager: dougeby
10-
ms.date: 06/21/2022
10+
ms.date: 07/21/2022
1111
ms.topic: how-to
1212
ms.service: microsoft-intune
1313
ms.subservice: configuration
@@ -38,6 +38,7 @@ Using the settings catalog in Intune, you can create a printer policy, and deplo
3838
This feature applies to:
3939

4040
- Windows 11
41+
- Windows 10 and later
4142

4243
This article shows you how to create a Universal Print policy in Microsoft Intune. To learn more about Universal Print and onboarding, go to [What is Universal Print](/universal-print/fundamentals/universal-print-whatis) and [Set up Universal Print](/universal-print/fundamentals/universal-print-getting-started).
4344

memdocs/intune/enrollment/apple-mdm-push-certificate-get.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ keywords:
88
author: Lenewsad
99
ms.author: lanewsad
1010
manager: dougeby
11-
ms.date: 07/12/2022
11+
ms.date: 07/15/2022
1212
ms.topic: how-to
1313
ms.service: microsoft-intune
1414
ms.subservice: enrollment
@@ -51,7 +51,7 @@ Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.co
5151
### Step 1. Grant Microsoft permission to send user and device information to Apple
5252
Select **I agree.** to give Microsoft permission to send data to Apple.
5353

54-
:::image type="content" source="./media/apple-mdm-push-certificate-get/create-mdm-push-certificate.png" alt-text="Screenshof of the Configure MDM Push Certificate screen with MDM Push not set up.":::
54+
:::image type="content" source="./media/apple-mdm-push-certificate-get/create-mdm-push-certificate.png" alt-text="Screenshot of the Configure MDM Push Certificate screen with MDM Push not set up.":::
5555

5656
### Step 2. Download the Intune certificate signing request required to create an Apple MDM push certificate
5757
Select **Download your CSR** to download and save the request file locally. The file is used to request a trust relationship certificate from the Apple Push Certificates Portal.

memdocs/intune/enrollment/device-group-mapping.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ You'll use the device category name when you create Azure Active Directory (Azur
5757

5858
### Step 2: Create Azure AD security groups
5959

60-
To enable automatic grouping, you must create a dynamic group using attribute-based rules in Azure AD. For instructions, see [Using attributes to create advanced rules](/azure/active-directory/users-groups-roles/groups-dynamic-membership#using-attributes-to-create-rules-for-device-objects) in the Azure AD documentation. Create an advanced rule for your group using the **deviceCategory** attribute and the category name you created in [Step 1](device-group-mapping.md#step-1-create-device category-in-Intune) of this article.
60+
To enable automatic grouping, you must create a dynamic group using attribute-based rules in Azure AD. For instructions, see [Using attributes to create advanced rules](/azure/active-directory/users-groups-roles/groups-dynamic-membership#using-attributes-to-create-rules-for-device-objects) in the Azure AD documentation. Create an advanced rule for your group using the **deviceCategory** attribute and the category name you created in Step 1 of this article.
6161

6262
For example, to create a rule that automatically groups devices belonging in the HR category, use the following rule syntax: `device.deviceCategory -eq "HR"`
6363

memdocs/intune/fundamentals/monitor-audit-logs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ Audit logs and operational logs can also be routed to Azure Monitor. In **Tenant
7474
7575
## Use Graph API to retrieve audit events
7676

77-
For details on using the graph API to get up to one year of audit events, see [List auditEvents](/graph/api/intune-auditing-auditevent-list?view=graph-rest-1.0).
77+
For details on using the graph API to get up to one year of audit events, see [List auditEvents](/graph/api/intune-auditing-auditevent-list).
7878

7979
## Next steps
8080

memdocs/intune/user-help/sign-in-to-the-company-portal.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -112,6 +112,12 @@ If you normally use a smart card to access work resources, follow the steps in t
112112

113113
5. Once the screen says that you're signed in to Company Portal, you can close the browser and switch to your work device.
114114

115+
The following articles describe the enrollment instructions for smart card-enabled devices, and includes the sign-in-from-another-device method.
116+
117+
* [Enroll with Entrust](enroll-ios-device-entrust-datacard.md)
118+
* [Enroll with Intercede](enroll-ios-device-intercede.md)
119+
* [Enroll with DISA Purebred](enroll-ios-device-disa-purebred.md)
120+
115121
## App permissions for Android
116122
The permissions described in this section apply to the Company Portal app for Android and devices running Android, versions 8.0 and later.
117123

0 commit comments

Comments
 (0)