Skip to content

Commit ffc0150

Browse files
author
Angela Fleischmann
authored
Update whats-new.md
https://microsoft-ce-csi.acrolinx.cloud/api/v1/checking/scorecards/2876efea-9a33-41ae-8550-552f0e63c5c8#CORRECTNESS - Line 97: should not should not > should not - Line 114: DFCI profiles lets > DFCI profiles let - Line 801: you must opt-in - Line 801: To opt-in, contact …. - Line 2484: newly-synced
1 parent 43c1bd7 commit ffc0150

1 file changed

Lines changed: 4 additions & 4 deletions

File tree

memdocs/intune/fundamentals/whats-new.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@ Intune-managed Android Enterprise dedicated devices enrolled with Azure Active D
9494
#### Users assigned the Endpoint Security Manager admin role can modify Mobile Threat Defense connector settings<!-- 14179885 -->
9595
We’ve updated the permissions of the built-in [Endpoint Security Manager](../fundamentals/role-based-access-control.md#built-in-roles) admin role. The role now has the **Modify** permission for the **Mobile Threat Defense** category set to **Yes**. With this change, users assigned this role have permission to change the [Mobile Threat Defense connector](../protect/mtd-connector-enable.md) (MTD connector) settings for your Tenant. Previously, this permission was set to *No*.
9696

97-
If you missed the previous notice about this coming change, now is a good time to review the users that are assigned the *Endpoint Security Manager* role for your tenant. If any should not should not have permissions to edit the MTD connector settings, update their role permissions or [create a custom role](../fundamentals/create-custom-role.md) that includes only *Read* permissions for Mobile Threat Defense.
97+
If you missed the previous notice about this coming change, now is a good time to review the users that are assigned the *Endpoint Security Manager* role for your tenant. If any should not have permissions to edit the MTD connector settings, update their role permissions or [create a custom role](../fundamentals/create-custom-role.md) that includes only *Read* permissions for Mobile Threat Defense.
9898

9999
View the full list of permissions for the built-in [Endpoint Security Manager role](../protect/endpoint-security.md#permissions-granted-by-the-endpoint-security-manager-role).
100100

@@ -111,7 +111,7 @@ You can now use the following [certificate profiles](../protect/certificates-con
111111
#### New settings for DFCI profiles on Windows 10/11 devices<!-- 6039135 -->
112112
On Windows 10/11 devices, you can create a Device Firmware Configuration Interface (DFCI) profile (**Devices** > **Configuration profiles** > **Create profile** > **Windows 10 and later** for platform > **Templates** > **Device Firmware Configuration Interface** for profile type).
113113

114-
DFCI profiles lets Intune pass management commands to UEFI (Unified Extensible Firmware Interface) using the DFCI firmware layer. This additional firmware layer makes configuration more resilient to malicious attacks. DFCI also limits end users' control over the BIOS by graying out managed settings.
114+
DFCI profiles let Intune pass management commands to UEFI (Unified Extensible Firmware Interface) using the DFCI firmware layer. This additional firmware layer makes configuration more resilient to malicious attacks. DFCI also limits end users' control over the BIOS by graying out managed settings.
115115

116116
There are new settings you can configure:
117117
- **Microphones and Speakers**:
@@ -798,7 +798,7 @@ For more information about protected apps, see [Microsoft Intune protected apps]
798798
There's a new **Software updates** page for tenant attached devices. This page displays the status for software updates on a device. You can review which updates are successfully installed, failed, and are assigned but not yet installed. Using the timestamp for the update status assists with troubleshooting. For more information, see [Tenant attach: Software updates in the admin center](../../configmgr/tenant-attach/software-updates.md).
799799

800800
#### Microsoft Defender for Endpoint support for App Sync on iOS/iPadOS<!-- 9768396 -->
801-
*Before you can use this capability you must opt-in to an MDE Preview. To opt-in, contact `[email protected]`.*
801+
*Before you can use this capability you must opt in to an MDE Preview. To opt in, contact `[email protected]`.*
802802

803803
When you use Microsoft Defender for Endpoint (MDE) as your Mobile Threat Defense application, as part of a preview from MDE, you can [configure MDE to request Application Inventory data](../protect/advanced-threat-protection-configure.md#enable-microsoft-defender-for-endpoint-in-intune) from Intune from iOS/iPadOS devices. The following two settings are now available:
804804

@@ -2481,7 +2481,7 @@ You can now enable Outlook S/MIME settings to always sign and/or always encrypt
24812481

24822482
#### Scope tags for Managed Google Play apps<!-- 6114508 -->
24832483

2484-
Scope tags determine which objects an admin with specific rights can view in Intune. Most newly created items in Intune take on the scope tags of the creator. This is not the case for Managed Google Play Store apps. You can now optionally assign a scope tag to apply to all newly-synced Managed Google Play apps on the **Managed Google Play connector** pane. The chosen scope tag will only apply to new Managed Google Play apps, not Managed Google Play apps that have already been approved in the tenant. For related information see [Add Managed Google Play apps to Android Enterprise devices with Intune](../apps/apps-add-android-for-work.md) and [Use role-based access control (RBAC) and scope tags for distributed IT](../fundamentals/scope-tags.md).
2484+
Scope tags determine which objects an admin with specific rights can view in Intune. Most newly created items in Intune take on the scope tags of the creator. This is not the case for Managed Google Play Store apps. You can now optionally assign a scope tag to apply to all newly synced Managed Google Play apps on the **Managed Google Play connector** pane. The chosen scope tag will only apply to new Managed Google Play apps, not Managed Google Play apps that have already been approved in the tenant. For related information see [Add Managed Google Play apps to Android Enterprise devices with Intune](../apps/apps-add-android-for-work.md) and [Use role-based access control (RBAC) and scope tags for distributed IT](../fundamentals/scope-tags.md).
24852485

24862486
#### Content of macOS LOB apps will be displayed in Intune<!-- 6991005 -->
24872487

0 commit comments

Comments
 (0)