Skip to content

Commit f506516

Browse files
authored
Merge pull request #6206 from MicrosoftDocs/main
11/23/2021 PM Publish
2 parents bb4265b + 49d9493 commit f506516

4 files changed

Lines changed: 18 additions & 4 deletions

File tree

memdocs/configmgr/core/clients/manage/collections/manage-collections.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -181,7 +181,7 @@ When you view properties for a collection, you can view and configure the follow
181181

182182
- **Distribution Point Groups**: Associate one or more distribution point groups to members of the selected collection. For more information, see [Manage content and content infrastructure](../../../servers/deploy/configure/manage-content-and-content-infrastructure.md).
183183

184-
- **Cloud Sync**: Synchronize collection membership results to Azure Active Directory groups. This synchronization is a [pre-release feature](../../../servers/manage/pre-release-features.md). For more information, see [Create collections](create-collections.md#bkmk_aadcollsync).
184+
- **Cloud Sync**: Synchronize collection membership results to Azure Active Directory groups. For more information, see [Create collections](create-collections.md#bkmk_aadcollsync).
185185

186186
Starting in version 2006, you can also make this collection available to assign endpoint security policies when you tenant-attach the site. For more information, see [Tenant attach: Onboard Configuration Manager clients to Microsoft Defender for Endpoint from the admin center](../../../../tenant-attach/atp-onboard.md).
187187

memdocs/intune/protect/advanced-threat-protection-configure.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ You only need to enable Microsoft Defender for Endpoint a single time per tenant
5757
:::image type="content" source="./media/advanced-threat-protection-configure/atp-device-compliance-open-microsoft-defender.png" alt-text="Screen shot that shows the patch to open the Microsoft Defender Security Center.":::
5858

5959
3. In **Microsoft Defender Security Center**:
60-
1. Select **Settings** > **Advanced features**.
60+
1. Select **Settings** > **Endpoints** >**Advanced features**.
6161
2. For **Microsoft Intune connection**, choose **On**:
6262

6363
:::image type="content" source="./media/advanced-threat-protection-configure/atp-security-center-intune-toggle.png" alt-text="Screen shot of the Microsoft Intune connection setting.":::

memdocs/intune/protect/mde-security-integration.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: brenduns
88
ms.author: brenduns
99
manager: dougeby
10-
ms.date: 11/18/2021
10+
ms.date: 11/22/2021
1111
ms.topic: how-to
1212
ms.service: microsoft-intune
1313
ms.subservice: protect
@@ -170,6 +170,9 @@ To support MDE security configuration management through the Microsoft Endpoint
170170

171171
Microsoft Defender for Endpoint supports several options to onboard devices. For current guidance, see [Onboarding tools and methods for Windows devices](/microsoft-365/security/defender-endpoint/security-config-management?view=o365-worldwide&preserve-view=true) in the Defender for Endpoint documentation.
172172

173+
> [!IMPORTANT]
174+
> After a device onboards with Microsoft Defender for Endpoint, it must and be tagged with **MDE-Management** before it can enroll with Security Management for Microsoft Defender for Endpoint. For more information on device tagging in MDE, see [*Create and manage device tags*](/microsoft-365/security/defender-endpoint/machine-tags?view=o365-worldwide&viewFallbackFrom=o365-worldwide).
175+
173176
Devices that you manage with Intune are not supported for this scenario.
174177

175178
## Create Azure AD Groups

memdocs/intune/protect/microsoft-tunnel-prerequisites.md

Lines changed: 12 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ keywords:
55
author: brenduns
66
ms.author: brenduns
77
manager: dougeby
8-
ms.date: 10/19/2021
8+
ms.date: 11/23/2021
99
ms.topic: how-to
1010
ms.service: microsoft-intune
1111
ms.subservice: protect
@@ -235,6 +235,17 @@ The following details can help you configure an internal proxy when using RHEL 8
235235

236236
In this example, port 3128 is now associated with both *http_port-t* and *squid_port_t*. That result is expected. If your proxy port isn't listed when running the *sudo semanage port -l | grep "your_proxy_port"* command, then run the command to modify the port again, but the **-m** in the *semanage* command with **-a**: `sudo semanage port -a -t http_port_t -p tcp “your proxy port”`
237237

238+
### Update the proxy server in use by the tunnel server
239+
240+
To change the proxy server configuration that is in use by the Linux host of the tunnel server, use the following procedure:
241+
242+
1. On the tunnel server, edit */etc/mstunnel/env.sh* and specify the new proxy server.
243+
2. Run `mst-cli install`.
244+
245+
This command rebuilds the containers with the new proxy server details. During this process you’re asked to verify the contents of */etc/mstunnel/env.h* and to make sure that the certificate is installed. The certificate should already be present from the previous proxy server configuration.
246+
247+
To confirm both and complete the configuration, enter **yes**.
248+
238249
## Platforms
239250

240251
Devices must be enrolled to Intune to be supported with Microsoft Tunnel. Only the following device platforms are supported:

0 commit comments

Comments
 (0)