Skip to content

Commit ec7cfc8

Browse files
author
Thomas Raya
authored
Merge pull request #8063 from MicrosoftDocs/main
Merge live to main Thursday, 10:30
2 parents b15dd56 + 70c3a21 commit ec7cfc8

38 files changed

Lines changed: 106 additions & 85 deletions

memdocs/configmgr/protect/deploy-use/endpoint-protection-configure-standalone-client.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -18,6 +18,9 @@ ms.localizationpriority: medium
1818

1919
Your organization may have a number of standalone clients that you cannot manage or protect with Microsoft Endpoint Configuration Manager. Without any endpoint protection in place, these standalone clients are vulnerable to potential malware attacks. To protect such standalone clients, you can manually configure them with Endpoint Protection, as described in this topic.
2020

21+
> [!NOTE]
22+
> If you install the endpoint protection client on a device that's not managed by Configuration Manager, a [Management License (ML)](https://www.microsoft.com/licensing/product-licensing/client-access-license) may be required for the device.
23+
2124
To configure Endpoint Protection on a standalone client manually:
2225

2326
- [Create an antimalware policy for the standalone client](#create-an-antimalware-policy-for-the-standalone-client)

memdocs/intune/configuration/device-profile-assign.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -2,12 +2,12 @@
22
# required metadata
33

44
title: Assign device profiles in Microsoft Intune
5-
description: Use the Microsoft Endpoint Manager admin center to assign device profiles and policies to users and devices. Learn how to exclude groups from a profile assignment in Microsoft Intune.
5+
description: Use the Microsoft Endpoint Manager admin center to assign device configuration profiles and policies to users and devices. Learn how to exclude groups from a profile assignment in Microsoft Intune.
66
keywords:
77
author: MandiOhlinger
88
ms.author: mandia
99
manager: dougeby
10-
ms.date: 01/18/2022
10+
ms.date: 07/21/2022
1111
ms.topic: how-to
1212
ms.service: microsoft-intune
1313
ms.subservice: configuration
@@ -30,11 +30,13 @@ ms.collection:
3030
- highpri
3131
---
3232

33-
# Assign user and device profiles in Microsoft Intune
33+
# Assign user and device configuration profiles in Microsoft Intune
3434

35-
You create a profile, and it includes all the settings you entered. The next step is to deploy or "assign" the profile to your user or device groups. When it's assigned, the users and devices receive your profile, and the settings you entered are applied.
35+
You create a device configuration profile, and it includes all the settings you entered. The next step is to deploy or "assign" the profile to your user or device groups. When it's assigned, the users and devices receive your profile, and the settings you entered are applied.
3636

37-
This article shows you how to assign a profile, and includes some information on using scope tags on your profiles.
37+
This article shows you how to assign a profile, and includes some information on using scope tags on your device configuration profiles.
38+
39+
For information on device configuration profiles, and what you can configure, go to [Apply features and settings on your devices using device profiles in Microsoft Intune](device-profiles.md).
3840

3941
> [!NOTE]
4042
> When a profile is removed or no longer assigned to a device, different things can happen, depending on the settings in the profile. The settings are based on CSPs, and each CSP can handle the profile removal differently. For example, a setting might keep the existing value, and not revert back to a default value. The behavior is controlled by each CSP in the operating system. For a list of Windows CSPs, see [configuration service provider (CSP) reference](/windows/client-management/mdm/configuration-service-provider-reference).
@@ -117,7 +119,6 @@ As a best practice:
117119

118120
For more information on groups, see [Add groups to organize users and devices](../fundamentals/groups-add.md).
119121

120-
121122
### Fundamentals
122123

123124
When you assign your policies and profiles, apply the following general principles:

memdocs/intune/configuration/email-settings-android-enterprise.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: MandiOhlinger
88
ms.author: mandia
99
manager: dougeby
10-
ms.date: 03/07/2022
10+
ms.date: 07/21/2022
1111
ms.topic: conceptual
1212
ms.service: microsoft-intune
1313
ms.subservice: configuration
@@ -43,6 +43,9 @@ As an Intune administrator, you can create and assign email settings to Android
4343

4444
- Create an [Android Enterprise email device configuration profile](email-settings-configure.md) > **Personally-owned work profile**.
4545
- Or, create an [app configuration policy](../apps/app-configuration-policies-use-android.md).
46+
- If your profile will use Gmail and you want to use modern authentication, then you may have to deploy the Google Chrome app to the work profile.
47+
48+
For more specific information, go to [Add Android store apps to Microsoft Intune](../apps/store-apps-android.md) and [Assign apps to groups with Microsoft Intune](../apps/apps-deploy.md).
4649

4750
## Android Enterprise
4851

memdocs/intune/configuration/settings-catalog-printer-provisioning.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: MandiOhlinger
88
ms.author: mandia
99
manager: dougeby
10-
ms.date: 06/21/2022
10+
ms.date: 07/21/2022
1111
ms.topic: how-to
1212
ms.service: microsoft-intune
1313
ms.subservice: configuration
@@ -38,6 +38,7 @@ Using the settings catalog in Intune, you can create a printer policy, and deplo
3838
This feature applies to:
3939

4040
- Windows 11
41+
- Windows 10 and later
4142

4243
This article shows you how to create a Universal Print policy in Microsoft Intune. To learn more about Universal Print and onboarding, go to [What is Universal Print](/universal-print/fundamentals/universal-print-whatis) and [Set up Universal Print](/universal-print/fundamentals/universal-print-getting-started).
4344

memdocs/intune/enrollment/apple-mdm-push-certificate-get.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ keywords:
88
author: Lenewsad
99
ms.author: lanewsad
1010
manager: dougeby
11-
ms.date: 07/12/2022
11+
ms.date: 07/15/2022
1212
ms.topic: how-to
1313
ms.service: microsoft-intune
1414
ms.subservice: enrollment
@@ -51,7 +51,7 @@ Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.co
5151
### Step 1. Grant Microsoft permission to send user and device information to Apple
5252
Select **I agree.** to give Microsoft permission to send data to Apple.
5353

54-
:::image type="content" source="./media/apple-mdm-push-certificate-get/create-mdm-push-certificate.png" alt-text="Screenshof of the Configure MDM Push Certificate screen with MDM Push not set up.":::
54+
:::image type="content" source="./media/apple-mdm-push-certificate-get/create-mdm-push-certificate.png" alt-text="Screenshot of the Configure MDM Push Certificate screen with MDM Push not set up.":::
5555

5656
### Step 2. Download the Intune certificate signing request required to create an Apple MDM push certificate
5757
Select **Download your CSR** to download and save the request file locally. The file is used to request a trust relationship certificate from the Apple Push Certificates Portal.

memdocs/intune/enrollment/device-group-mapping.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ You'll use the device category name when you create Azure Active Directory (Azur
5757

5858
### Step 2: Create Azure AD security groups
5959

60-
To enable automatic grouping, you must create a dynamic group using attribute-based rules in Azure AD. For instructions, see [Using attributes to create advanced rules](/azure/active-directory/users-groups-roles/groups-dynamic-membership#using-attributes-to-create-rules-for-device-objects) in the Azure AD documentation. Create an advanced rule for your group using the **deviceCategory** attribute and the category name you created in [Step 1](device-group-mapping.md#step-1-create-device category-in-Intune) of this article.
60+
To enable automatic grouping, you must create a dynamic group using attribute-based rules in Azure AD. For instructions, see [Using attributes to create advanced rules](/azure/active-directory/users-groups-roles/groups-dynamic-membership#using-attributes-to-create-rules-for-device-objects) in the Azure AD documentation. Create an advanced rule for your group using the **deviceCategory** attribute and the category name you created in Step 1 of this article.
6161

6262
For example, to create a rule that automatically groups devices belonging in the HR category, use the following rule syntax: `device.deviceCategory -eq "HR"`
6363

memdocs/intune/fundamentals/monitor-audit-logs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ Audit logs and operational logs can also be routed to Azure Monitor. In **Tenant
7474
7575
## Use Graph API to retrieve audit events
7676

77-
For details on using the graph API to get up to one year of audit events, see [List auditEvents](/graph/api/intune-auditing-auditevent-list?view=graph-rest-1.0).
77+
For details on using the graph API to get up to one year of audit events, see [List auditEvents](/graph/api/intune-auditing-auditevent-list).
7878

7979
## Next steps
8080

memdocs/intune/user-help/sign-in-to-the-company-portal.md

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -112,6 +112,15 @@ If you normally use a smart card to access work resources, follow the steps in t
112112

113113
5. Once the screen says that you're signed in to Company Portal, you can close the browser and switch to your work device.
114114

115+
The following articles describe the enrollment instructions for smart card-enabled devices, and includes the sign-in-from-another-device method.
116+
117+
* [Enroll with Entrust for iOS](enroll-ios-device-entrust-datacard.md)
118+
* [Enroll with Entrust for Android](enroll-android-device-entrust-datacard.md)
119+
* [Enroll with Intercede for iOS](enroll-ios-device-intercede.md)
120+
* [Enroll with Intercede for Android](enroll-android-device-intercede.md)
121+
* [Enroll with DISA Purebred for iOS](enroll-ios-device-disa-purebred.md)
122+
* [Enroll with DISA Purebred for Android](enroll-android-device-disa-purebred.md)
123+
115124
## App permissions for Android
116125
The permissions described in this section apply to the Company Portal app for Android and devices running Android, versions 8.0 and later.
117126

windows-365/business-enterprise-comparison.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ Windows 365 is available in two editions: [Windows 365 Business](./business/inde
6767
| Capability | Windows 365 Business | Windows 365 Enterprise |
6868
| --- | --- | --- |
6969
| Management | Users can [restart, reset, rename, and troubleshoot](./end-user-access-cloud-pc.md#user-actions) their Cloud PCs on the Windows 365 homepage. | Users can [restart, rename, and troubleshoot](end-user-access-cloud-pc.md) their Cloud PCs on the Windows 365 homepage. |
70-
| Role | By default, each user is a Standard User on their Cloud PC. To grant Local Administrator permissions to a specific user on a Cloud PC, see [Remote management actions](./business/remotely-manage-business-cloud-pcs.md#remote-management-actions). To grant Local Administrator permissions for Cloud PCs that you create in the future, see [Change organizational default settings](./business/change-organization-default-settings.md).| By default, each user is assigned a standard user role on their Cloud PC. This can be changed by the admin in the Microsoft Endpoint Manager admin center.|
70+
| Role | By default, each user is a Standard User on their Cloud PC. To grant Local Administrator permissions to a specific user on a Cloud PC, see [Remote management actions](./business/remotely-manage-business-cloud-pcs.md#remote-management-actions). To grant Local Administrator permissions for Cloud PCs that you create in the future, see [Change organizational default settings](./business/change-organization-default-settings.md).| By default, each user is assigned a standard user role on their Cloud PC. This role can be changed by the admin in the Microsoft Endpoint Manager admin center.|
7171
| Access | Users can access their Cloud PC at windows365.microsoft.com or by using Microsoft Remote Desktop. | Users can access their Cloud PC at windows365.microsoft.com or by using Microsoft Remote Desktop. |
7272
| Platform | Any platform that supports Microsoft Remote Desktop clients. [Learn more.](/windows-server/remote/remote-desktop-services/clients/remote-desktop-clients) | Any platform that supports Microsoft Remote Desktop clients. [Learn more.](/windows-server/remote/remote-desktop-services/clients/remote-desktop-clients) |
7373

windows-365/business/add-user-assign-licenses.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,4 +40,4 @@ You can add a user and assign them licenses by following these steps:
4040
6. If you want to specify a password, de-select the **Automatically create a password** box. Then, enter a password.
4141
7. If you don’t want to require the user to change their password when they first sign into the new Cloud PC, de-select the **This user must change their password when they first sign in** box.
4242
8. If you don't want to automatically email the sign-in info to the user, de-select **Email the sign-in info** box.
43-
9. Select **Add user**. A new Cloud PC will be created and the user can use the sign in information to access it.
43+
9. Select **Add user**. A new Cloud PC will be created and the user can use the sign-in information to access it.

0 commit comments

Comments
 (0)