diff --git a/autopilot/add-devices.md b/autopilot/add-devices.md index 6179845d4ec..6f5fbdb68cd 100644 --- a/autopilot/add-devices.md +++ b/autopilot/add-devices.md @@ -2,7 +2,7 @@ title: Manually register devices with Windows Autopilot description: Learn how to manually add devices to Windows Autopilot. ms.service: windows-client -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.localizationpriority: medium author: frankroj ms.author: frankroj diff --git a/autopilot/automatic-registration.md b/autopilot/automatic-registration.md index bc6ccee44d6..90027c2463d 100644 --- a/autopilot/automatic-registration.md +++ b/autopilot/automatic-registration.md @@ -2,7 +2,7 @@ title: Automatic registration of existing devices description: Automatically add devices to Windows Autopilot. ms.service: windows-client -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.localizationpriority: medium author: frankroj ms.author: frankroj diff --git a/autopilot/autopilot-device-guidelines.md b/autopilot/autopilot-device-guidelines.md index 59caae3011a..92d06b40cdc 100644 --- a/autopilot/autopilot-device-guidelines.md +++ b/autopilot/autopilot-device-guidelines.md @@ -2,7 +2,7 @@ title: Windows Autopilot device guidelines description: Learn all about hardware, firmware, and software best practices for Windows Autopilot deployment. ms.service: windows-client -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.localizationpriority: medium author: frankroj ms.author: frankroj diff --git a/autopilot/autopilot-motherboard-replacement.md b/autopilot/autopilot-motherboard-replacement.md index d7b28e613aa..8995779f4f9 100644 --- a/autopilot/autopilot-motherboard-replacement.md +++ b/autopilot/autopilot-motherboard-replacement.md @@ -2,7 +2,7 @@ title: Windows Autopilot motherboard replacement description: Understand how Windows Autopilot deployments function when the motherboard is replaced on a device. ms.service: windows-client -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.localizationpriority: medium author: frankroj ms.author: frankroj diff --git a/autopilot/autopilot-support.md b/autopilot/autopilot-support.md index b0bc21ab726..2c5d85558eb 100644 --- a/autopilot/autopilot-support.md +++ b/autopilot/autopilot-support.md @@ -2,7 +2,7 @@ title: Windows Autopilot support description: Find out who to contact for help with Windows Autopilot installation. ms.service: windows-client -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.localizationpriority: medium author: frankroj ms.author: frankroj diff --git a/autopilot/bitlocker.md b/autopilot/bitlocker.md index 6f8bdb639ca..4fd13bd310f 100644 --- a/autopilot/bitlocker.md +++ b/autopilot/bitlocker.md @@ -2,7 +2,7 @@ title: Setting the BitLocker encryption algorithm for Autopilot devices description: Microsoft Intune provides a comprehensive set of configuration options to manage BitLocker on Windows devices. ms.service: windows-client -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.localizationpriority: medium author: frankroj ms.author: frankroj diff --git a/autopilot/deployment-process.md b/autopilot/deployment-process.md index c842b7e8923..989c9c373a0 100644 --- a/autopilot/deployment-process.md +++ b/autopilot/deployment-process.md @@ -2,7 +2,7 @@ title: Windows deployment process posters description: View and download Windows deployment process flows for Microsoft Configuration Manager and Windows Autopilot. ms.service: windows-client -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.localizationpriority: medium author: frankroj ms.author: frankroj diff --git a/autopilot/device-preparation/compare.md b/autopilot/device-preparation/compare.md index 732636949d3..0286395fab6 100644 --- a/autopilot/device-preparation/compare.md +++ b/autopilot/device-preparation/compare.md @@ -2,7 +2,7 @@ title: Compare Windows Autopilot device preparation and Windows Autopilot description: Compare Windows Autopilot device preparation and Windows Autopilot features and when to use each. ms.service: windows-client -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.localizationpriority: medium author: frankroj ms.author: frankroj diff --git a/autopilot/device-preparation/faq.yml b/autopilot/device-preparation/faq.yml index 6f3b2642602..2fa2b7d4887 100644 --- a/autopilot/device-preparation/faq.yml +++ b/autopilot/device-preparation/faq.yml @@ -3,7 +3,7 @@ metadata: title: Windows Autopilot device preparation FAQ description: This article provides OEMs, partners, administrators, and users with answers to some frequently asked questions about deploying Windows with Windows Autopilot device preparation. ms.service: windows-client - ms.subservice: itpro-deploy + ms.subservice: autopilot ms.localizationpriority: medium author: frankroj ms.author: frankroj diff --git a/autopilot/device-preparation/known-issues.md b/autopilot/device-preparation/known-issues.md index 0f515a960fc..d34731b0cce 100644 --- a/autopilot/device-preparation/known-issues.md +++ b/autopilot/device-preparation/known-issues.md @@ -2,7 +2,7 @@ title: Windows Autopilot device preparation known issues description: Information regarding known issues that might occur during a Windows Autopilot device preparation deployment. # RSS subscription is based on this description so don't change. If the description needs to change, update RSS URL in the Tip in the article. ms.service: windows-client -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.localizationpriority: medium author: frankroj ms.author: frankroj diff --git a/autopilot/device-preparation/overview.md b/autopilot/device-preparation/overview.md index 99a86d08846..387220a75ff 100644 --- a/autopilot/device-preparation/overview.md +++ b/autopilot/device-preparation/overview.md @@ -2,7 +2,7 @@ title: Overview of Windows Autopilot device preparation description: Windows Autopilot device preparation is used to set up and configure new devices, getting them ready for productive use. ms.service: windows-client -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.localizationpriority: medium author: frankroj ms.author: frankroj diff --git a/autopilot/device-preparation/reporting-monitoring.md b/autopilot/device-preparation/reporting-monitoring.md index 8d51f0fb497..0fbe68d4005 100644 --- a/autopilot/device-preparation/reporting-monitoring.md +++ b/autopilot/device-preparation/reporting-monitoring.md @@ -2,7 +2,7 @@ title: Windows Autopilot device preparation reporting and monitoring description: Reporting and monitoring in Windows Autopilot device preparation. ms.service: windows-client -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.localizationpriority: medium author: frankroj ms.author: frankroj diff --git a/autopilot/device-preparation/requirements.md b/autopilot/device-preparation/requirements.md index 50493515c25..fdcf9c0277b 100644 --- a/autopilot/device-preparation/requirements.md +++ b/autopilot/device-preparation/requirements.md @@ -2,7 +2,7 @@ title: Windows Autopilot device preparation requirements description: Software, Networking, Licensing, Configuration, and RBAC requirements for Windows Autopilot device preparation. # RSS subscription is based on this description so don't change. If the description needs to change, update RSS URL in the Tip in the article. ms.service: windows-client -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.localizationpriority: medium author: frankroj ms.author: frankroj diff --git a/autopilot/device-preparation/troubleshooting-faq.yml b/autopilot/device-preparation/troubleshooting-faq.yml index aa293f70eda..44f3f4e87ce 100644 --- a/autopilot/device-preparation/troubleshooting-faq.yml +++ b/autopilot/device-preparation/troubleshooting-faq.yml @@ -3,7 +3,7 @@ metadata: title: Windows Autopilot device preparation troubleshooting FAQ description: Troubleshooting of common Windows Autopilot device preparation issues ms.service: windows-client - ms.subservice: itpro-deploy + ms.subservice: autopilot ms.localizationpriority: medium author: frankroj ms.author: frankroj diff --git a/autopilot/device-preparation/tutorial/scenarios.md b/autopilot/device-preparation/tutorial/scenarios.md index 908572b7f23..d499cb2d86f 100644 --- a/autopilot/device-preparation/tutorial/scenarios.md +++ b/autopilot/device-preparation/tutorial/scenarios.md @@ -13,7 +13,7 @@ ms.collection: - tier1 - highpri - essentials-get-started -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 --- diff --git a/autopilot/device-preparation/tutorial/user-driven/entra-join-allow-users-to-join.md b/autopilot/device-preparation/tutorial/user-driven/entra-join-allow-users-to-join.md index ea4a0a609e4..05b23e1c343 100644 --- a/autopilot/device-preparation/tutorial/user-driven/entra-join-allow-users-to-join.md +++ b/autopilot/device-preparation/tutorial/user-driven/entra-join-allow-users-to-join.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 --- diff --git a/autopilot/device-preparation/tutorial/user-driven/entra-join-assign-apps-scripts.md b/autopilot/device-preparation/tutorial/user-driven/entra-join-assign-apps-scripts.md index f5d14eebaee..311d3de1724 100644 --- a/autopilot/device-preparation/tutorial/user-driven/entra-join-assign-apps-scripts.md +++ b/autopilot/device-preparation/tutorial/user-driven/entra-join-assign-apps-scripts.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 --- diff --git a/autopilot/device-preparation/tutorial/user-driven/entra-join-automatic-enrollment.md b/autopilot/device-preparation/tutorial/user-driven/entra-join-automatic-enrollment.md index f29a39485ff..25c5aaa1004 100644 --- a/autopilot/device-preparation/tutorial/user-driven/entra-join-automatic-enrollment.md +++ b/autopilot/device-preparation/tutorial/user-driven/entra-join-automatic-enrollment.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 --- diff --git a/autopilot/device-preparation/tutorial/user-driven/entra-join-autopilot-policy.md b/autopilot/device-preparation/tutorial/user-driven/entra-join-autopilot-policy.md index 4ee1a059037..8f6d1e4393f 100644 --- a/autopilot/device-preparation/tutorial/user-driven/entra-join-autopilot-policy.md +++ b/autopilot/device-preparation/tutorial/user-driven/entra-join-autopilot-policy.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 --- diff --git a/autopilot/device-preparation/tutorial/user-driven/entra-join-corporate-identifier.md b/autopilot/device-preparation/tutorial/user-driven/entra-join-corporate-identifier.md index 542056ae5f3..de805257695 100644 --- a/autopilot/device-preparation/tutorial/user-driven/entra-join-corporate-identifier.md +++ b/autopilot/device-preparation/tutorial/user-driven/entra-join-corporate-identifier.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 --- diff --git a/autopilot/device-preparation/tutorial/user-driven/entra-join-device-group.md b/autopilot/device-preparation/tutorial/user-driven/entra-join-device-group.md index 46472776a2d..11a8c61fa98 100644 --- a/autopilot/device-preparation/tutorial/user-driven/entra-join-device-group.md +++ b/autopilot/device-preparation/tutorial/user-driven/entra-join-device-group.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 --- diff --git a/autopilot/device-preparation/tutorial/user-driven/entra-join-user-group.md b/autopilot/device-preparation/tutorial/user-driven/entra-join-user-group.md index 02af86b522a..8471217c2d7 100644 --- a/autopilot/device-preparation/tutorial/user-driven/entra-join-user-group.md +++ b/autopilot/device-preparation/tutorial/user-driven/entra-join-user-group.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 --- diff --git a/autopilot/device-preparation/tutorial/user-driven/entra-join-workflow.md b/autopilot/device-preparation/tutorial/user-driven/entra-join-workflow.md index b479118df64..101329db4d6 100644 --- a/autopilot/device-preparation/tutorial/user-driven/entra-join-workflow.md +++ b/autopilot/device-preparation/tutorial/user-driven/entra-join-workflow.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 --- diff --git a/autopilot/device-preparation/whats-new.md b/autopilot/device-preparation/whats-new.md index 3b2ab37fdee..ba8714bec7d 100644 --- a/autopilot/device-preparation/whats-new.md +++ b/autopilot/device-preparation/whats-new.md @@ -2,7 +2,7 @@ title: What's new in Windows Autopilot device preparation description: News and resources about the latest updates of Windows Autopilot device preparation. # RSS subscription is based on this description so don't change. If the description needs to change, update RSS URL in the Tip in the article. ms.service: windows-client -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.localizationpriority: medium author: frankroj ms.author: frankroj diff --git a/autopilot/dfci-management.md b/autopilot/dfci-management.md index 3029fb06767..7df516a9369 100644 --- a/autopilot/dfci-management.md +++ b/autopilot/dfci-management.md @@ -1,7 +1,7 @@ --- title: DFCI Management description: With Windows Autopilot Deployment and Intune, Unified Extensible Firmware Interface (UEFI) settings can be managed after the device is enrolled. UEFI settings can be managed by using the Device Firmware Configuration Interface (DFCI). -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.service: windows-client ms.localizationpriority: medium author: frankroj diff --git a/autopilot/enrollment-autopilot.md b/autopilot/enrollment-autopilot.md index b8cbbb7bbbf..fb809bf38ad 100644 --- a/autopilot/enrollment-autopilot.md +++ b/autopilot/enrollment-autopilot.md @@ -9,7 +9,7 @@ ms.date: 06/28/2024 ms.topic: how-to ms.localizationpriority: high ms.service: windows-client -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.suite: ems search.appverid: MET150 ms.collection: diff --git a/autopilot/enrollment-status.md b/autopilot/enrollment-status.md index 611c5252a37..15012e20f0b 100644 --- a/autopilot/enrollment-status.md +++ b/autopilot/enrollment-status.md @@ -1,7 +1,7 @@ --- title: Windows Autopilot Enrollment Status Page description: Gives an overview of the Enrollment Status Page capabilities, configuration. -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.service: windows-client ms.localizationpriority: medium author: frankroj diff --git a/autopilot/existing-devices.md b/autopilot/existing-devices.md index 3cc9aaae6e1..681d63e2d80 100644 --- a/autopilot/existing-devices.md +++ b/autopilot/existing-devices.md @@ -2,7 +2,7 @@ title: Windows Autopilot for existing devices description: Modern desktop deployment with Windows Autopilot enables easily deploying the latest version of Windows to existing devices. ms.service: windows-client -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.localizationpriority: medium author: frankroj ms.author: frankroj diff --git a/autopilot/faq.yml b/autopilot/faq.yml index b5506775517..d7b36e5e8dd 100644 --- a/autopilot/faq.yml +++ b/autopilot/faq.yml @@ -3,7 +3,7 @@ metadata: title: Windows Autopilot FAQ description: This article provides OEMs, partners, administrators, and end users with answers to some frequently asked questions about deploying Windows with Autopilot. ms.service: windows-client - ms.subservice: itpro-deploy + ms.subservice: autopilot ms.localizationpriority: medium author: frankroj ms.author: frankroj diff --git a/autopilot/includes/allow-users-to-join.md b/autopilot/includes/allow-users-to-join.md index b6d04467e5c..b0f079c4345 100644 --- a/autopilot/includes/allow-users-to-join.md +++ b/autopilot/includes/allow-users-to-join.md @@ -2,7 +2,7 @@ author: frankroj ms.author: frankroj manager: aaroncz -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.service: windows-client ms.topic: include ms.date: 06/19/2024 diff --git a/autopilot/includes/automatic-intune-enrollment.md b/autopilot/includes/automatic-intune-enrollment.md index b7cfd1ab669..bd24c22ba01 100644 --- a/autopilot/includes/automatic-intune-enrollment.md +++ b/autopilot/includes/automatic-intune-enrollment.md @@ -2,7 +2,7 @@ author: frankroj ms.author: frankroj manager: aaroncz -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.service: windows-client ms.topic: include ms.date: 06/19/2024 diff --git a/autopilot/includes/create-assigned-device-group.md b/autopilot/includes/create-assigned-device-group.md index 9c48c1c8e4c..2b4edc32041 100644 --- a/autopilot/includes/create-assigned-device-group.md +++ b/autopilot/includes/create-assigned-device-group.md @@ -2,7 +2,7 @@ author: frankroj ms.author: frankroj manager: aaroncz -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.service: windows-client ms.topic: include ms.date: 06/27/2024 diff --git a/autopilot/includes/create-dynamic-device-group.md b/autopilot/includes/create-dynamic-device-group.md index 301d2eb5232..936dbaa235b 100644 --- a/autopilot/includes/create-dynamic-device-group.md +++ b/autopilot/includes/create-dynamic-device-group.md @@ -2,7 +2,7 @@ author: frankroj ms.author: frankroj manager: aaroncz -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.service: windows-client ms.topic: include ms.date: 06/19/2024 diff --git a/autopilot/includes/create-user-group.md b/autopilot/includes/create-user-group.md index 54ae9a42d41..04955fadd18 100644 --- a/autopilot/includes/create-user-group.md +++ b/autopilot/includes/create-user-group.md @@ -2,7 +2,7 @@ author: frankroj ms.author: frankroj manager: aaroncz -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.service: windows-client ms.topic: include ms.date: 06/03/2024 diff --git a/autopilot/includes/deregister-autopilot-device.md b/autopilot/includes/deregister-autopilot-device.md index 12e56de47b6..08b16043753 100644 --- a/autopilot/includes/deregister-autopilot-device.md +++ b/autopilot/includes/deregister-autopilot-device.md @@ -2,7 +2,7 @@ author: frankroj ms.author: frankroj manager: aaroncz -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.service: windows-client ms.topic: include ms.date: 06/28/2024 diff --git a/autopilot/includes/more-info-allow-users-to-join.md b/autopilot/includes/more-info-allow-users-to-join.md index 932c20c8e7f..01b09b75642 100644 --- a/autopilot/includes/more-info-allow-users-to-join.md +++ b/autopilot/includes/more-info-allow-users-to-join.md @@ -2,7 +2,7 @@ author: frankroj ms.author: frankroj manager: aaroncz -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.service: windows-client ms.topic: include ms.date: 06/03/2024 diff --git a/autopilot/includes/more-info-automatic-enrollment.md b/autopilot/includes/more-info-automatic-enrollment.md index ce8eb5cb030..ea5dd570f8f 100644 --- a/autopilot/includes/more-info-automatic-enrollment.md +++ b/autopilot/includes/more-info-automatic-enrollment.md @@ -2,7 +2,7 @@ author: frankroj ms.author: frankroj manager: aaroncz -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.service: windows-client ms.topic: include ms.date: 06/03/2024 diff --git a/autopilot/includes/more-info-groups.md b/autopilot/includes/more-info-groups.md index a62645c8b71..bcba396dbdd 100644 --- a/autopilot/includes/more-info-groups.md +++ b/autopilot/includes/more-info-groups.md @@ -2,7 +2,7 @@ author: frankroj ms.author: frankroj manager: aaroncz -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.service: windows-client ms.topic: include ms.date: 06/11/2024 diff --git a/autopilot/includes/registered-vs-joined.md b/autopilot/includes/registered-vs-joined.md index d36a8c63cd5..fd750712ac4 100644 --- a/autopilot/includes/registered-vs-joined.md +++ b/autopilot/includes/registered-vs-joined.md @@ -2,7 +2,7 @@ author: frankroj ms.author: frankroj manager: aaroncz -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.service: windows-client ms.topic: include ms.date: 06/19/2024 diff --git a/autopilot/index.yml b/autopilot/index.yml index 6802e2060e2..bd70f300a18 100644 --- a/autopilot/index.yml +++ b/autopilot/index.yml @@ -6,7 +6,7 @@ metadata: title: Windows Autopilot and Windows Autopilot device preparation documentation description: Windows Autopilot and Windows Autopilot device preparation is a collection of technologies used to set up and pre-configure new devices, getting them ready for productive use. ms.service: windows-client - ms.subservice: itpro-deploy + ms.subservice: autopilot ms.topic: landing-page ms.collection: - tier1 diff --git a/autopilot/known-issues.md b/autopilot/known-issues.md index 14e06664169..96ad2954807 100644 --- a/autopilot/known-issues.md +++ b/autopilot/known-issues.md @@ -2,7 +2,7 @@ title: Windows Autopilot known issues description: Be informed about known issues that might occur during Windows Autopilot deployment. # RSS subscription is based on this description so don't change. If the description needs to change, update RSS URL in the Tip in the article. ms.service: windows-client -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.localizationpriority: medium author: frankroj ms.author: frankroj diff --git a/autopilot/manual-registration.md b/autopilot/manual-registration.md index 101ad806931..f9548ad43db 100644 --- a/autopilot/manual-registration.md +++ b/autopilot/manual-registration.md @@ -2,7 +2,7 @@ title: Manual registration of devices for Windows Autopilot description: Manual registration overview. ms.service: windows-client -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.localizationpriority: medium author: frankroj ms.author: frankroj diff --git a/autopilot/oem-registration.md b/autopilot/oem-registration.md index ccf3fa55156..8f0f92b8b3e 100644 --- a/autopilot/oem-registration.md +++ b/autopilot/oem-registration.md @@ -2,7 +2,7 @@ title: Windows Autopilot OEM registration process description: How OEMs add devices to Windows Autopilot. ms.service: windows-client -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.localizationpriority: medium author: frankroj ms.author: frankroj diff --git a/autopilot/overview.md b/autopilot/overview.md index b40ae2ef3c8..d32eecce349 100644 --- a/autopilot/overview.md +++ b/autopilot/overview.md @@ -2,7 +2,7 @@ title: Overview of Windows Autopilot description: Windows Autopilot is a collection of technologies used to set up and pre-configure new devices, getting them ready for productive use. ms.service: windows-client -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.localizationpriority: medium author: frankroj ms.author: frankroj diff --git a/autopilot/partner-registration.md b/autopilot/partner-registration.md index 39519890168..7ac754a7251 100644 --- a/autopilot/partner-registration.md +++ b/autopilot/partner-registration.md @@ -2,7 +2,7 @@ title: Reseller, distributor, or partner registration of Windows Autopilot devices description: How partners add devices to Windows Autopilot. ms.service: windows-client -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.localizationpriority: medium author: frankroj ms.author: frankroj diff --git a/autopilot/pre-provision.md b/autopilot/pre-provision.md index 3755f3df748..67958993f67 100644 --- a/autopilot/pre-provision.md +++ b/autopilot/pre-provision.md @@ -2,7 +2,7 @@ title: Windows Autopilot for pre-provisioned deployment description: Windows Autopilot for pre-provisioned deployment. ms.service: windows-client -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.localizationpriority: medium ms.reviewer: jubaptis manager: aaroncz diff --git a/autopilot/profiles.md b/autopilot/profiles.md index 2477654964c..944fbc34c41 100644 --- a/autopilot/profiles.md +++ b/autopilot/profiles.md @@ -1,7 +1,7 @@ --- title: Configure Autopilot profiles description: Learn how to configure device profiles for Windows Autopilot deployment. -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.service: windows-client ms.localizationpriority: medium author: frankroj diff --git a/autopilot/registration-auth.md b/autopilot/registration-auth.md index b3a04bedcf0..6c8e1c61263 100644 --- a/autopilot/registration-auth.md +++ b/autopilot/registration-auth.md @@ -1,7 +1,7 @@ --- title: Windows Autopilot customer consent description: Learn how a cloud service provider (CSP) partner or an OEM can get customer authorization to register Windows Autopilot devices on the customer's behalf. -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.service: windows-client ms.localizationpriority: medium author: frankroj diff --git a/autopilot/registration-overview.md b/autopilot/registration-overview.md index 15722176c7e..382a55ce285 100644 --- a/autopilot/registration-overview.md +++ b/autopilot/registration-overview.md @@ -2,7 +2,7 @@ title: Windows Autopilot registration overview description: Overview of Windows Autopilot device registration. ms.service: windows-client -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.localizationpriority: medium author: frankroj ms.author: frankroj diff --git a/autopilot/requirements.md b/autopilot/requirements.md index 019899b45e2..7fbe6cdec2d 100644 --- a/autopilot/requirements.md +++ b/autopilot/requirements.md @@ -2,7 +2,7 @@ title: Windows Autopilot requirements description: Software, Networking, Licensing, and Configuration requirements for Windows Autopilot. ms.service: windows-client -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.localizationpriority: medium author: frankroj ms.author: frankroj diff --git a/autopilot/self-deploying.md b/autopilot/self-deploying.md index affa15222e1..a3cc171e358 100644 --- a/autopilot/self-deploying.md +++ b/autopilot/self-deploying.md @@ -1,7 +1,7 @@ --- title: Windows Autopilot self-deploying mode description: Self-deploying mode allows a device to be deployed with little to no user interaction. This mode is designed to deploy Windows as a kiosk, digital signage device, or a shared device. -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.service: windows-client ms.localizationpriority: medium author: frankroj diff --git a/autopilot/troubleshooting-faq.yml b/autopilot/troubleshooting-faq.yml index 763b30ba8cd..4498640d149 100644 --- a/autopilot/troubleshooting-faq.yml +++ b/autopilot/troubleshooting-faq.yml @@ -3,7 +3,7 @@ metadata: title: Windows Autopilot troubleshooting FAQ description: Troubleshooting of common Windows Autopilot issues ms.service: windows-client - ms.subservice: itpro-deploy + ms.subservice: autopilot ms.localizationpriority: medium author: frankroj ms.author: frankroj diff --git a/autopilot/tutorial/autopilot-scenarios.md b/autopilot/tutorial/autopilot-scenarios.md index c1d9bd273b1..da3f50674ff 100644 --- a/autopilot/tutorial/autopilot-scenarios.md +++ b/autopilot/tutorial/autopilot-scenarios.md @@ -13,7 +13,7 @@ ms.collection: - tier1 - highpri - essentials-get-started -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/existing-devices/create-autopilot-task-sequence.md b/autopilot/tutorial/existing-devices/create-autopilot-task-sequence.md index 76502d96d77..d8f0c625fa6 100644 --- a/autopilot/tutorial/existing-devices/create-autopilot-task-sequence.md +++ b/autopilot/tutorial/existing-devices/create-autopilot-task-sequence.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/existing-devices/create-collection.md b/autopilot/tutorial/existing-devices/create-collection.md index 0e54bd6dbd2..f7189bff124 100644 --- a/autopilot/tutorial/existing-devices/create-collection.md +++ b/autopilot/tutorial/existing-devices/create-collection.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/existing-devices/create-json-file.md b/autopilot/tutorial/existing-devices/create-json-file.md index 5ee57b1ab99..f96ebae258c 100644 --- a/autopilot/tutorial/existing-devices/create-json-file.md +++ b/autopilot/tutorial/existing-devices/create-json-file.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/existing-devices/create-json-package.md b/autopilot/tutorial/existing-devices/create-json-package.md index cf6e134bf04..a6d7703f263 100644 --- a/autopilot/tutorial/existing-devices/create-json-package.md +++ b/autopilot/tutorial/existing-devices/create-json-package.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/existing-devices/deploy-autopilot-task-sequence.md b/autopilot/tutorial/existing-devices/deploy-autopilot-task-sequence.md index 0f73c3fc894..f2c0ef008d9 100644 --- a/autopilot/tutorial/existing-devices/deploy-autopilot-task-sequence.md +++ b/autopilot/tutorial/existing-devices/deploy-autopilot-task-sequence.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/existing-devices/existing-devices-workflow.md b/autopilot/tutorial/existing-devices/existing-devices-workflow.md index fd80be62cf6..327d2dd0f83 100644 --- a/autopilot/tutorial/existing-devices/existing-devices-workflow.md +++ b/autopilot/tutorial/existing-devices/existing-devices-workflow.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/existing-devices/install-modules.md b/autopilot/tutorial/existing-devices/install-modules.md index c2f3b9372ab..620bb88447f 100644 --- a/autopilot/tutorial/existing-devices/install-modules.md +++ b/autopilot/tutorial/existing-devices/install-modules.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/existing-devices/register-device.md b/autopilot/tutorial/existing-devices/register-device.md index d143ff69129..b19f9e64262 100644 --- a/autopilot/tutorial/existing-devices/register-device.md +++ b/autopilot/tutorial/existing-devices/register-device.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/existing-devices/run-autopilot-task-sequence.md b/autopilot/tutorial/existing-devices/run-autopilot-task-sequence.md index b78b0203c09..00b8dc49434 100644 --- a/autopilot/tutorial/existing-devices/run-autopilot-task-sequence.md +++ b/autopilot/tutorial/existing-devices/run-autopilot-task-sequence.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/existing-devices/setup-autopilot-profile.md b/autopilot/tutorial/existing-devices/setup-autopilot-profile.md index 9b595f13d51..72965295914 100644 --- a/autopilot/tutorial/existing-devices/setup-autopilot-profile.md +++ b/autopilot/tutorial/existing-devices/setup-autopilot-profile.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/existing-devices/speed-up-deployment.md b/autopilot/tutorial/existing-devices/speed-up-deployment.md index f931978af3f..b5e7cfbc33b 100644 --- a/autopilot/tutorial/existing-devices/speed-up-deployment.md +++ b/autopilot/tutorial/existing-devices/speed-up-deployment.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/includes/assign-autopilot-device-to-user-via-csv.md b/autopilot/tutorial/includes/assign-autopilot-device-to-user-via-csv.md index e5fef781e43..353d71b85c7 100644 --- a/autopilot/tutorial/includes/assign-autopilot-device-to-user-via-csv.md +++ b/autopilot/tutorial/includes/assign-autopilot-device-to-user-via-csv.md @@ -2,7 +2,7 @@ author: frankroj ms.author: frankroj manager: aaroncz -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.service: windows-client ms.topic: include ms.date: 06/19/2024 diff --git a/autopilot/tutorial/includes/assign-autopilot-device-to-user.md b/autopilot/tutorial/includes/assign-autopilot-device-to-user.md index 3ed580eb432..846a5a18ec6 100644 --- a/autopilot/tutorial/includes/assign-autopilot-device-to-user.md +++ b/autopilot/tutorial/includes/assign-autopilot-device-to-user.md @@ -2,7 +2,7 @@ author: frankroj ms.author: frankroj manager: aaroncz -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.service: windows-client ms.topic: include ms.date: 06/28/2024 diff --git a/autopilot/tutorial/includes/autopilot-profile-steps-after.md b/autopilot/tutorial/includes/autopilot-profile-steps-after.md index b2617d22bba..18e9a914dd0 100644 --- a/autopilot/tutorial/includes/autopilot-profile-steps-after.md +++ b/autopilot/tutorial/includes/autopilot-profile-steps-after.md @@ -2,7 +2,7 @@ author: frankroj ms.author: frankroj manager: aaroncz -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.service: windows-client ms.topic: include ms.date: 06/19/2024 diff --git a/autopilot/tutorial/includes/autopilot-profile-steps-before.md b/autopilot/tutorial/includes/autopilot-profile-steps-before.md index f4725e771fd..2fc9ac44429 100644 --- a/autopilot/tutorial/includes/autopilot-profile-steps-before.md +++ b/autopilot/tutorial/includes/autopilot-profile-steps-before.md @@ -2,7 +2,7 @@ author: frankroj ms.author: frankroj manager: aaroncz -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.service: windows-client ms.topic: include ms.date: 06/28/2024 diff --git a/autopilot/tutorial/includes/computer-account-limit.md b/autopilot/tutorial/includes/computer-account-limit.md index ce89e9f9ab1..1a38e4ce74a 100644 --- a/autopilot/tutorial/includes/computer-account-limit.md +++ b/autopilot/tutorial/includes/computer-account-limit.md @@ -2,7 +2,7 @@ author: frankroj ms.author: frankroj manager: aaroncz -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.service: windows-client ms.topic: include ms.date: 06/19/2024 diff --git a/autopilot/tutorial/includes/configure-and-assign-esp.md b/autopilot/tutorial/includes/configure-and-assign-esp.md index a43bf9ba760..a3d827fb0d8 100644 --- a/autopilot/tutorial/includes/configure-and-assign-esp.md +++ b/autopilot/tutorial/includes/configure-and-assign-esp.md @@ -2,7 +2,7 @@ author: frankroj ms.author: frankroj manager: aaroncz -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.service: windows-client ms.topic: include ms.date: 06/28/2024 diff --git a/autopilot/tutorial/includes/device-group-description.md b/autopilot/tutorial/includes/device-group-description.md index 0e9a4dd89dc..790472c1996 100644 --- a/autopilot/tutorial/includes/device-group-description.md +++ b/autopilot/tutorial/includes/device-group-description.md @@ -2,7 +2,7 @@ author: frankroj ms.author: frankroj manager: aaroncz -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.service: windows-client ms.topic: include ms.date: 06/19/2024 diff --git a/autopilot/tutorial/includes/domain-join-profile.md b/autopilot/tutorial/includes/domain-join-profile.md index 70452a2e05a..67d21b3a657 100644 --- a/autopilot/tutorial/includes/domain-join-profile.md +++ b/autopilot/tutorial/includes/domain-join-profile.md @@ -2,7 +2,7 @@ author: frankroj ms.author: frankroj manager: aaroncz -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.service: windows-client ms.topic: include ms.date: 06/19/2024 diff --git a/autopilot/tutorial/includes/import-hardware-hash.md b/autopilot/tutorial/includes/import-hardware-hash.md index f791769d2e8..06d6707a23b 100644 --- a/autopilot/tutorial/includes/import-hardware-hash.md +++ b/autopilot/tutorial/includes/import-hardware-hash.md @@ -2,7 +2,7 @@ author: frankroj ms.author: frankroj manager: aaroncz -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.service: windows-client ms.topic: include ms.date: 06/28/2024 diff --git a/autopilot/tutorial/includes/intune-connector.md b/autopilot/tutorial/includes/intune-connector.md index a0acba2c5d3..c6c5e04f3e2 100644 --- a/autopilot/tutorial/includes/intune-connector.md +++ b/autopilot/tutorial/includes/intune-connector.md @@ -2,7 +2,7 @@ author: frankroj ms.author: frankroj manager: aaroncz -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.service: windows-client ms.topic: include ms.date: 06/28/2024 diff --git a/autopilot/tutorial/includes/more-info-autopilot-profile.md b/autopilot/tutorial/includes/more-info-autopilot-profile.md index 7f027c20cb6..558b969523d 100644 --- a/autopilot/tutorial/includes/more-info-autopilot-profile.md +++ b/autopilot/tutorial/includes/more-info-autopilot-profile.md @@ -2,7 +2,7 @@ author: frankroj ms.author: frankroj manager: aaroncz -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.service: windows-client ms.topic: include ms.date: 06/19/2024 diff --git a/autopilot/tutorial/includes/more-info-computer-account-limit.md b/autopilot/tutorial/includes/more-info-computer-account-limit.md index d60aec8ee09..b0016a1f17a 100644 --- a/autopilot/tutorial/includes/more-info-computer-account-limit.md +++ b/autopilot/tutorial/includes/more-info-computer-account-limit.md @@ -2,7 +2,7 @@ author: frankroj ms.author: frankroj manager: aaroncz -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.service: windows-client ms.topic: include ms.date: 06/19/2024 diff --git a/autopilot/tutorial/includes/more-info-esp.md b/autopilot/tutorial/includes/more-info-esp.md index 68686d52c42..48fcae2f1a8 100644 --- a/autopilot/tutorial/includes/more-info-esp.md +++ b/autopilot/tutorial/includes/more-info-esp.md @@ -2,7 +2,7 @@ author: frankroj ms.author: frankroj manager: aaroncz -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.service: windows-client ms.topic: include ms.date: 06/19/2024 diff --git a/autopilot/tutorial/includes/more-info-register-device.md b/autopilot/tutorial/includes/more-info-register-device.md index 41ff6dabde7..2eabbff384d 100644 --- a/autopilot/tutorial/includes/more-info-register-device.md +++ b/autopilot/tutorial/includes/more-info-register-device.md @@ -2,7 +2,7 @@ author: frankroj ms.author: frankroj manager: aaroncz -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.service: windows-client ms.topic: include ms.date: 06/19/2024 diff --git a/autopilot/tutorial/includes/more-info-technician-flow.md b/autopilot/tutorial/includes/more-info-technician-flow.md index 6f87c17fa31..5a9efc39447 100644 --- a/autopilot/tutorial/includes/more-info-technician-flow.md +++ b/autopilot/tutorial/includes/more-info-technician-flow.md @@ -2,7 +2,7 @@ author: frankroj ms.author: frankroj manager: aaroncz -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.service: windows-client ms.topic: include ms.date: 06/19/2024 diff --git a/autopilot/tutorial/includes/more-info-user-flow.md b/autopilot/tutorial/includes/more-info-user-flow.md index 3d6bb3c87e0..487e970d1db 100644 --- a/autopilot/tutorial/includes/more-info-user-flow.md +++ b/autopilot/tutorial/includes/more-info-user-flow.md @@ -2,7 +2,7 @@ author: frankroj ms.author: frankroj manager: aaroncz -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.service: windows-client ms.topic: include ms.date: 06/19/2024 diff --git a/autopilot/tutorial/includes/network-connectivity.md b/autopilot/tutorial/includes/network-connectivity.md index 38cb833299e..cd222bcf815 100644 --- a/autopilot/tutorial/includes/network-connectivity.md +++ b/autopilot/tutorial/includes/network-connectivity.md @@ -2,7 +2,7 @@ author: frankroj ms.author: frankroj manager: aaroncz -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.service: windows-client ms.topic: include ms.date: 06/19/2024 diff --git a/autopilot/tutorial/includes/register-autopilot-device.md b/autopilot/tutorial/includes/register-autopilot-device.md index 273dbc15c57..98e3b5312ee 100644 --- a/autopilot/tutorial/includes/register-autopilot-device.md +++ b/autopilot/tutorial/includes/register-autopilot-device.md @@ -2,7 +2,7 @@ author: frankroj ms.author: frankroj manager: aaroncz -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.service: windows-client ms.topic: include ms.date: 06/28/2024 diff --git a/autopilot/tutorial/includes/technician-flow.md b/autopilot/tutorial/includes/technician-flow.md index 8b7501cd9b6..8202c707c5e 100644 --- a/autopilot/tutorial/includes/technician-flow.md +++ b/autopilot/tutorial/includes/technician-flow.md @@ -2,7 +2,7 @@ author: frankroj ms.author: frankroj manager: aaroncz -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.service: windows-client ms.topic: include ms.date: 06/19/2024 diff --git a/autopilot/tutorial/includes/tips-aadj-screens.md b/autopilot/tutorial/includes/tips-aadj-screens.md index 3704a72a0f7..7ff86f503cf 100644 --- a/autopilot/tutorial/includes/tips-aadj-screens.md +++ b/autopilot/tutorial/includes/tips-aadj-screens.md @@ -2,7 +2,7 @@ author: frankroj ms.author: frankroj manager: aaroncz -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.service: windows-client ms.topic: include ms.date: 06/19/2024 diff --git a/autopilot/tutorial/includes/tips-assignments.md b/autopilot/tutorial/includes/tips-assignments.md index f60444bd65b..e2b0dfb10f6 100644 --- a/autopilot/tutorial/includes/tips-assignments.md +++ b/autopilot/tutorial/includes/tips-assignments.md @@ -2,7 +2,7 @@ author: frankroj ms.author: frankroj manager: aaroncz -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.service: windows-client ms.topic: include ms.date: 06/19/2024 diff --git a/autopilot/tutorial/includes/tips-esp-progress.md b/autopilot/tutorial/includes/tips-esp-progress.md index abd1ad1e2f5..4229e2e0c61 100644 --- a/autopilot/tutorial/includes/tips-esp-progress.md +++ b/autopilot/tutorial/includes/tips-esp-progress.md @@ -2,7 +2,7 @@ author: frankroj ms.author: frankroj manager: aaroncz -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.service: windows-client ms.topic: include ms.date: 06/19/2024 diff --git a/autopilot/tutorial/includes/tips-haadj-lock.md b/autopilot/tutorial/includes/tips-haadj-lock.md index 872a0f423fb..a9295c6af9d 100644 --- a/autopilot/tutorial/includes/tips-haadj-lock.md +++ b/autopilot/tutorial/includes/tips-haadj-lock.md @@ -2,7 +2,7 @@ author: frankroj ms.author: frankroj manager: aaroncz -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.service: windows-client ms.topic: include ms.date: 06/19/2024 diff --git a/autopilot/tutorial/includes/tips-haadj-screens.md b/autopilot/tutorial/includes/tips-haadj-screens.md index 4e4452226d8..7ed03f5d6b2 100644 --- a/autopilot/tutorial/includes/tips-haadj-screens.md +++ b/autopilot/tutorial/includes/tips-haadj-screens.md @@ -2,7 +2,7 @@ author: frankroj ms.author: frankroj manager: aaroncz -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.service: windows-client ms.topic: include ms.date: 06/19/2024 diff --git a/autopilot/tutorial/includes/tips-pre-provision-compliance-user-flow.md b/autopilot/tutorial/includes/tips-pre-provision-compliance-user-flow.md index 5509bac0568..e9e56ebca23 100644 --- a/autopilot/tutorial/includes/tips-pre-provision-compliance-user-flow.md +++ b/autopilot/tutorial/includes/tips-pre-provision-compliance-user-flow.md @@ -2,7 +2,7 @@ author: frankroj ms.author: frankroj manager: aaroncz -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.service: windows-client ms.topic: include ms.date: 06/19/2024 diff --git a/autopilot/tutorial/includes/tips-pre-provision-wait-user-flow.md b/autopilot/tutorial/includes/tips-pre-provision-wait-user-flow.md index 522bd32fb6e..9eccefa932a 100644 --- a/autopilot/tutorial/includes/tips-pre-provision-wait-user-flow.md +++ b/autopilot/tutorial/includes/tips-pre-provision-wait-user-flow.md @@ -2,7 +2,7 @@ author: frankroj ms.author: frankroj manager: aaroncz -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.service: windows-client ms.topic: include ms.date: 07/23/2024 diff --git a/autopilot/tutorial/includes/tips-qr-codes.md b/autopilot/tutorial/includes/tips-qr-codes.md index a421ca4e046..6f8b5db58d3 100644 --- a/autopilot/tutorial/includes/tips-qr-codes.md +++ b/autopilot/tutorial/includes/tips-qr-codes.md @@ -2,7 +2,7 @@ author: frankroj ms.author: frankroj manager: aaroncz -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.service: windows-client ms.topic: include ms.date: 06/19/2024 diff --git a/autopilot/tutorial/includes/tips-technician-flow-inherit.md b/autopilot/tutorial/includes/tips-technician-flow-inherit.md index 77089c338d8..b0939eab5ab 100644 --- a/autopilot/tutorial/includes/tips-technician-flow-inherit.md +++ b/autopilot/tutorial/includes/tips-technician-flow-inherit.md @@ -2,7 +2,7 @@ author: frankroj ms.author: frankroj manager: aaroncz -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.service: windows-client ms.topic: include ms.date: 06/19/2024 diff --git a/autopilot/tutorial/includes/tips-technician-flow-screens.md b/autopilot/tutorial/includes/tips-technician-flow-screens.md index f664ea1df16..1edec497528 100644 --- a/autopilot/tutorial/includes/tips-technician-flow-screens.md +++ b/autopilot/tutorial/includes/tips-technician-flow-screens.md @@ -2,7 +2,7 @@ author: frankroj ms.author: frankroj manager: aaroncz -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.service: windows-client ms.topic: include ms.date: 06/19/2024 diff --git a/autopilot/tutorial/includes/verify-autopilot-profile-assignment.md b/autopilot/tutorial/includes/verify-autopilot-profile-assignment.md index ba5366d92c2..234f294c110 100644 --- a/autopilot/tutorial/includes/verify-autopilot-profile-assignment.md +++ b/autopilot/tutorial/includes/verify-autopilot-profile-assignment.md @@ -2,7 +2,7 @@ author: frankroj ms.author: frankroj manager: aaroncz -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.service: windows-client ms.topic: include ms.date: 06/28/2024 diff --git a/autopilot/tutorial/pre-provisioning/azure-ad-join-allow-users-to-join.md b/autopilot/tutorial/pre-provisioning/azure-ad-join-allow-users-to-join.md index 50351eec132..914ad4d33a7 100644 --- a/autopilot/tutorial/pre-provisioning/azure-ad-join-allow-users-to-join.md +++ b/autopilot/tutorial/pre-provisioning/azure-ad-join-allow-users-to-join.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/pre-provisioning/azure-ad-join-assign-device-to-user.md b/autopilot/tutorial/pre-provisioning/azure-ad-join-assign-device-to-user.md index 9dec27ad867..cb791d8abd5 100644 --- a/autopilot/tutorial/pre-provisioning/azure-ad-join-assign-device-to-user.md +++ b/autopilot/tutorial/pre-provisioning/azure-ad-join-assign-device-to-user.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/pre-provisioning/azure-ad-join-automatic-enrollment.md b/autopilot/tutorial/pre-provisioning/azure-ad-join-automatic-enrollment.md index 547d63c28e3..98040abf649 100644 --- a/autopilot/tutorial/pre-provisioning/azure-ad-join-automatic-enrollment.md +++ b/autopilot/tutorial/pre-provisioning/azure-ad-join-automatic-enrollment.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/pre-provisioning/azure-ad-join-autopilot-profile.md b/autopilot/tutorial/pre-provisioning/azure-ad-join-autopilot-profile.md index 6bc8a209233..c7ac55d8f6d 100644 --- a/autopilot/tutorial/pre-provisioning/azure-ad-join-autopilot-profile.md +++ b/autopilot/tutorial/pre-provisioning/azure-ad-join-autopilot-profile.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/pre-provisioning/azure-ad-join-device-group.md b/autopilot/tutorial/pre-provisioning/azure-ad-join-device-group.md index dabd1e08a78..033931c5409 100644 --- a/autopilot/tutorial/pre-provisioning/azure-ad-join-device-group.md +++ b/autopilot/tutorial/pre-provisioning/azure-ad-join-device-group.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/pre-provisioning/azure-ad-join-esp.md b/autopilot/tutorial/pre-provisioning/azure-ad-join-esp.md index 9b893e6f4be..fd121b9cf1d 100644 --- a/autopilot/tutorial/pre-provisioning/azure-ad-join-esp.md +++ b/autopilot/tutorial/pre-provisioning/azure-ad-join-esp.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/pre-provisioning/azure-ad-join-register-device.md b/autopilot/tutorial/pre-provisioning/azure-ad-join-register-device.md index 28005a24780..073272d3573 100644 --- a/autopilot/tutorial/pre-provisioning/azure-ad-join-register-device.md +++ b/autopilot/tutorial/pre-provisioning/azure-ad-join-register-device.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/pre-provisioning/azure-ad-join-technician-flow.md b/autopilot/tutorial/pre-provisioning/azure-ad-join-technician-flow.md index 8ec1098fa0c..d28b74f7f0f 100644 --- a/autopilot/tutorial/pre-provisioning/azure-ad-join-technician-flow.md +++ b/autopilot/tutorial/pre-provisioning/azure-ad-join-technician-flow.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 @@ -57,7 +57,7 @@ For an overview of the Windows Autopilot for pre-provisioned deployment Microsof ## Next step: User flow > [!div class="nextstepaction"] -> [Step 8: User flow](azure-ad-join-user-flow.md) +> [Step 9: User flow](azure-ad-join-user-flow.md) ## Related content diff --git a/autopilot/tutorial/pre-provisioning/azure-ad-join-user-flow.md b/autopilot/tutorial/pre-provisioning/azure-ad-join-user-flow.md index 762ff80a68c..8ee5af36cee 100644 --- a/autopilot/tutorial/pre-provisioning/azure-ad-join-user-flow.md +++ b/autopilot/tutorial/pre-provisioning/azure-ad-join-user-flow.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/pre-provisioning/azure-ad-join-workflow.md b/autopilot/tutorial/pre-provisioning/azure-ad-join-workflow.md index e480ef3b8d4..f7c88ea8768 100644 --- a/autopilot/tutorial/pre-provisioning/azure-ad-join-workflow.md +++ b/autopilot/tutorial/pre-provisioning/azure-ad-join-workflow.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/pre-provisioning/hybrid-azure-ad-join-assign-device-to-user.md b/autopilot/tutorial/pre-provisioning/hybrid-azure-ad-join-assign-device-to-user.md index 1565c2501e7..e1ca668aac6 100644 --- a/autopilot/tutorial/pre-provisioning/hybrid-azure-ad-join-assign-device-to-user.md +++ b/autopilot/tutorial/pre-provisioning/hybrid-azure-ad-join-assign-device-to-user.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/pre-provisioning/hybrid-azure-ad-join-automatic-enrollment.md b/autopilot/tutorial/pre-provisioning/hybrid-azure-ad-join-automatic-enrollment.md index 2afe5eee7a5..6b8bd3d8d29 100644 --- a/autopilot/tutorial/pre-provisioning/hybrid-azure-ad-join-automatic-enrollment.md +++ b/autopilot/tutorial/pre-provisioning/hybrid-azure-ad-join-automatic-enrollment.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/pre-provisioning/hybrid-azure-ad-join-autopilot-profile.md b/autopilot/tutorial/pre-provisioning/hybrid-azure-ad-join-autopilot-profile.md index 9ef8cd9e01b..27bdc807fed 100644 --- a/autopilot/tutorial/pre-provisioning/hybrid-azure-ad-join-autopilot-profile.md +++ b/autopilot/tutorial/pre-provisioning/hybrid-azure-ad-join-autopilot-profile.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/pre-provisioning/hybrid-azure-ad-join-computer-account-limit.md b/autopilot/tutorial/pre-provisioning/hybrid-azure-ad-join-computer-account-limit.md index 3caeee7356f..43581884b84 100644 --- a/autopilot/tutorial/pre-provisioning/hybrid-azure-ad-join-computer-account-limit.md +++ b/autopilot/tutorial/pre-provisioning/hybrid-azure-ad-join-computer-account-limit.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/pre-provisioning/hybrid-azure-ad-join-device-group.md b/autopilot/tutorial/pre-provisioning/hybrid-azure-ad-join-device-group.md index 715b8426da0..4c43a0e0dca 100644 --- a/autopilot/tutorial/pre-provisioning/hybrid-azure-ad-join-device-group.md +++ b/autopilot/tutorial/pre-provisioning/hybrid-azure-ad-join-device-group.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/pre-provisioning/hybrid-azure-ad-join-domain-join-profile.md b/autopilot/tutorial/pre-provisioning/hybrid-azure-ad-join-domain-join-profile.md index c7d934a9999..a1be397537e 100644 --- a/autopilot/tutorial/pre-provisioning/hybrid-azure-ad-join-domain-join-profile.md +++ b/autopilot/tutorial/pre-provisioning/hybrid-azure-ad-join-domain-join-profile.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/pre-provisioning/hybrid-azure-ad-join-esp.md b/autopilot/tutorial/pre-provisioning/hybrid-azure-ad-join-esp.md index d289ed93382..b3a434baf9a 100644 --- a/autopilot/tutorial/pre-provisioning/hybrid-azure-ad-join-esp.md +++ b/autopilot/tutorial/pre-provisioning/hybrid-azure-ad-join-esp.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/pre-provisioning/hybrid-azure-ad-join-intune-connector.md b/autopilot/tutorial/pre-provisioning/hybrid-azure-ad-join-intune-connector.md index 47e217f7eac..67e4a27c904 100644 --- a/autopilot/tutorial/pre-provisioning/hybrid-azure-ad-join-intune-connector.md +++ b/autopilot/tutorial/pre-provisioning/hybrid-azure-ad-join-intune-connector.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/pre-provisioning/hybrid-azure-ad-join-register-device.md b/autopilot/tutorial/pre-provisioning/hybrid-azure-ad-join-register-device.md index 5c326d9341b..b5da52db97c 100644 --- a/autopilot/tutorial/pre-provisioning/hybrid-azure-ad-join-register-device.md +++ b/autopilot/tutorial/pre-provisioning/hybrid-azure-ad-join-register-device.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/pre-provisioning/hybrid-azure-ad-join-technician-flow.md b/autopilot/tutorial/pre-provisioning/hybrid-azure-ad-join-technician-flow.md index c71060cf31a..8320e82e9d1 100644 --- a/autopilot/tutorial/pre-provisioning/hybrid-azure-ad-join-technician-flow.md +++ b/autopilot/tutorial/pre-provisioning/hybrid-azure-ad-join-technician-flow.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/pre-provisioning/hybrid-azure-ad-join-user-flow.md b/autopilot/tutorial/pre-provisioning/hybrid-azure-ad-join-user-flow.md index 8b59922948f..97a1695b593 100644 --- a/autopilot/tutorial/pre-provisioning/hybrid-azure-ad-join-user-flow.md +++ b/autopilot/tutorial/pre-provisioning/hybrid-azure-ad-join-user-flow.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/pre-provisioning/hybrid-azure-ad-join-workflow.md b/autopilot/tutorial/pre-provisioning/hybrid-azure-ad-join-workflow.md index c92da5ee749..6d9b1140576 100644 --- a/autopilot/tutorial/pre-provisioning/hybrid-azure-ad-join-workflow.md +++ b/autopilot/tutorial/pre-provisioning/hybrid-azure-ad-join-workflow.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/reset/autopilot-reset-overview.md b/autopilot/tutorial/reset/autopilot-reset-overview.md index c226ccb39d5..6fdd9904fe6 100644 --- a/autopilot/tutorial/reset/autopilot-reset-overview.md +++ b/autopilot/tutorial/reset/autopilot-reset-overview.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/reset/local-autopilot-reset.md b/autopilot/tutorial/reset/local-autopilot-reset.md index 1d79f109399..037396dae36 100644 --- a/autopilot/tutorial/reset/local-autopilot-reset.md +++ b/autopilot/tutorial/reset/local-autopilot-reset.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/reset/remote-autopilot-reset.md b/autopilot/tutorial/reset/remote-autopilot-reset.md index 662a642f7dc..48cc5240107 100644 --- a/autopilot/tutorial/reset/remote-autopilot-reset.md +++ b/autopilot/tutorial/reset/remote-autopilot-reset.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/self-deploying/self-deploying-automatic-enrollment.md b/autopilot/tutorial/self-deploying/self-deploying-automatic-enrollment.md index 704b1bcda2c..6fdb1085fb1 100644 --- a/autopilot/tutorial/self-deploying/self-deploying-automatic-enrollment.md +++ b/autopilot/tutorial/self-deploying/self-deploying-automatic-enrollment.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/self-deploying/self-deploying-autopilot-profile.md b/autopilot/tutorial/self-deploying/self-deploying-autopilot-profile.md index 8c3150563c7..b036e3f6905 100644 --- a/autopilot/tutorial/self-deploying/self-deploying-autopilot-profile.md +++ b/autopilot/tutorial/self-deploying/self-deploying-autopilot-profile.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/self-deploying/self-deploying-deploy-device.md b/autopilot/tutorial/self-deploying/self-deploying-deploy-device.md index 120ab0d9524..eeea52bf88d 100644 --- a/autopilot/tutorial/self-deploying/self-deploying-deploy-device.md +++ b/autopilot/tutorial/self-deploying/self-deploying-deploy-device.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/self-deploying/self-deploying-device-group.md b/autopilot/tutorial/self-deploying/self-deploying-device-group.md index 49daf27b367..cc27c806558 100644 --- a/autopilot/tutorial/self-deploying/self-deploying-device-group.md +++ b/autopilot/tutorial/self-deploying/self-deploying-device-group.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/self-deploying/self-deploying-esp.md b/autopilot/tutorial/self-deploying/self-deploying-esp.md index 0bc8d3d9206..2eee8d4e2f8 100644 --- a/autopilot/tutorial/self-deploying/self-deploying-esp.md +++ b/autopilot/tutorial/self-deploying/self-deploying-esp.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/self-deploying/self-deploying-register-device.md b/autopilot/tutorial/self-deploying/self-deploying-register-device.md index 6f99db720e3..8e6b4e59b63 100644 --- a/autopilot/tutorial/self-deploying/self-deploying-register-device.md +++ b/autopilot/tutorial/self-deploying/self-deploying-register-device.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/self-deploying/self-deploying-workflow.md b/autopilot/tutorial/self-deploying/self-deploying-workflow.md index 3efe4e12a9e..bc658e23b6c 100644 --- a/autopilot/tutorial/self-deploying/self-deploying-workflow.md +++ b/autopilot/tutorial/self-deploying/self-deploying-workflow.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/user-driven/azure-ad-join-allow-users-to-join.md b/autopilot/tutorial/user-driven/azure-ad-join-allow-users-to-join.md index de2e5c2b693..81b8312809f 100644 --- a/autopilot/tutorial/user-driven/azure-ad-join-allow-users-to-join.md +++ b/autopilot/tutorial/user-driven/azure-ad-join-allow-users-to-join.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/user-driven/azure-ad-join-assign-device-to-user.md b/autopilot/tutorial/user-driven/azure-ad-join-assign-device-to-user.md index 48055e2ff4f..607e2ddd533 100644 --- a/autopilot/tutorial/user-driven/azure-ad-join-assign-device-to-user.md +++ b/autopilot/tutorial/user-driven/azure-ad-join-assign-device-to-user.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/user-driven/azure-ad-join-automatic-enrollment.md b/autopilot/tutorial/user-driven/azure-ad-join-automatic-enrollment.md index 88ee263759b..5c6c0cdceab 100644 --- a/autopilot/tutorial/user-driven/azure-ad-join-automatic-enrollment.md +++ b/autopilot/tutorial/user-driven/azure-ad-join-automatic-enrollment.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/user-driven/azure-ad-join-autopilot-profile.md b/autopilot/tutorial/user-driven/azure-ad-join-autopilot-profile.md index 01553712f5d..416c6bc3c13 100644 --- a/autopilot/tutorial/user-driven/azure-ad-join-autopilot-profile.md +++ b/autopilot/tutorial/user-driven/azure-ad-join-autopilot-profile.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/user-driven/azure-ad-join-deploy-device.md b/autopilot/tutorial/user-driven/azure-ad-join-deploy-device.md index ae10af97155..ea26a9706bf 100644 --- a/autopilot/tutorial/user-driven/azure-ad-join-deploy-device.md +++ b/autopilot/tutorial/user-driven/azure-ad-join-deploy-device.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/user-driven/azure-ad-join-device-group.md b/autopilot/tutorial/user-driven/azure-ad-join-device-group.md index 6ea0130c8ce..f14db15b644 100644 --- a/autopilot/tutorial/user-driven/azure-ad-join-device-group.md +++ b/autopilot/tutorial/user-driven/azure-ad-join-device-group.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/user-driven/azure-ad-join-esp.md b/autopilot/tutorial/user-driven/azure-ad-join-esp.md index 026bbbacfa1..9fc9ebe144e 100644 --- a/autopilot/tutorial/user-driven/azure-ad-join-esp.md +++ b/autopilot/tutorial/user-driven/azure-ad-join-esp.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/user-driven/azure-ad-join-register-device.md b/autopilot/tutorial/user-driven/azure-ad-join-register-device.md index f49cef7b84f..f86017e6af8 100644 --- a/autopilot/tutorial/user-driven/azure-ad-join-register-device.md +++ b/autopilot/tutorial/user-driven/azure-ad-join-register-device.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/user-driven/azure-ad-join-workflow.md b/autopilot/tutorial/user-driven/azure-ad-join-workflow.md index b506eabdd71..68731176313 100644 --- a/autopilot/tutorial/user-driven/azure-ad-join-workflow.md +++ b/autopilot/tutorial/user-driven/azure-ad-join-workflow.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/user-driven/hybrid-azure-ad-join-assign-device-to-user.md b/autopilot/tutorial/user-driven/hybrid-azure-ad-join-assign-device-to-user.md index 6701bfe9b51..80e8026852e 100644 --- a/autopilot/tutorial/user-driven/hybrid-azure-ad-join-assign-device-to-user.md +++ b/autopilot/tutorial/user-driven/hybrid-azure-ad-join-assign-device-to-user.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/user-driven/hybrid-azure-ad-join-automatic-enrollment.md b/autopilot/tutorial/user-driven/hybrid-azure-ad-join-automatic-enrollment.md index 003b3ebf2cc..e540987de83 100644 --- a/autopilot/tutorial/user-driven/hybrid-azure-ad-join-automatic-enrollment.md +++ b/autopilot/tutorial/user-driven/hybrid-azure-ad-join-automatic-enrollment.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/user-driven/hybrid-azure-ad-join-autopilot-profile.md b/autopilot/tutorial/user-driven/hybrid-azure-ad-join-autopilot-profile.md index 297df952a7f..f13778c7514 100644 --- a/autopilot/tutorial/user-driven/hybrid-azure-ad-join-autopilot-profile.md +++ b/autopilot/tutorial/user-driven/hybrid-azure-ad-join-autopilot-profile.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/user-driven/hybrid-azure-ad-join-computer-account-limit.md b/autopilot/tutorial/user-driven/hybrid-azure-ad-join-computer-account-limit.md index c1384ef2de9..440f49fa5cb 100644 --- a/autopilot/tutorial/user-driven/hybrid-azure-ad-join-computer-account-limit.md +++ b/autopilot/tutorial/user-driven/hybrid-azure-ad-join-computer-account-limit.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/user-driven/hybrid-azure-ad-join-deploy-device.md b/autopilot/tutorial/user-driven/hybrid-azure-ad-join-deploy-device.md index 341335f9484..d094b88c0c1 100644 --- a/autopilot/tutorial/user-driven/hybrid-azure-ad-join-deploy-device.md +++ b/autopilot/tutorial/user-driven/hybrid-azure-ad-join-deploy-device.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/user-driven/hybrid-azure-ad-join-device-group.md b/autopilot/tutorial/user-driven/hybrid-azure-ad-join-device-group.md index 9a27ec76ad9..824be5a3d94 100644 --- a/autopilot/tutorial/user-driven/hybrid-azure-ad-join-device-group.md +++ b/autopilot/tutorial/user-driven/hybrid-azure-ad-join-device-group.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/user-driven/hybrid-azure-ad-join-domain-join-profile.md b/autopilot/tutorial/user-driven/hybrid-azure-ad-join-domain-join-profile.md index d443dbfa1ce..5be10d3e76a 100644 --- a/autopilot/tutorial/user-driven/hybrid-azure-ad-join-domain-join-profile.md +++ b/autopilot/tutorial/user-driven/hybrid-azure-ad-join-domain-join-profile.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/user-driven/hybrid-azure-ad-join-esp.md b/autopilot/tutorial/user-driven/hybrid-azure-ad-join-esp.md index daf6dd6b1bd..e65593d2ea1 100644 --- a/autopilot/tutorial/user-driven/hybrid-azure-ad-join-esp.md +++ b/autopilot/tutorial/user-driven/hybrid-azure-ad-join-esp.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/user-driven/hybrid-azure-ad-join-intune-connector.md b/autopilot/tutorial/user-driven/hybrid-azure-ad-join-intune-connector.md index fbab12c98a8..007a097530c 100644 --- a/autopilot/tutorial/user-driven/hybrid-azure-ad-join-intune-connector.md +++ b/autopilot/tutorial/user-driven/hybrid-azure-ad-join-intune-connector.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/user-driven/hybrid-azure-ad-join-register-device.md b/autopilot/tutorial/user-driven/hybrid-azure-ad-join-register-device.md index c545fea91fc..3a38510987f 100644 --- a/autopilot/tutorial/user-driven/hybrid-azure-ad-join-register-device.md +++ b/autopilot/tutorial/user-driven/hybrid-azure-ad-join-register-device.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/tutorial/user-driven/hybrid-azure-ad-join-workflow.md b/autopilot/tutorial/user-driven/hybrid-azure-ad-join-workflow.md index 54754a54a6e..62dbc18b1bd 100644 --- a/autopilot/tutorial/user-driven/hybrid-azure-ad-join-workflow.md +++ b/autopilot/tutorial/user-driven/hybrid-azure-ad-join-workflow.md @@ -12,7 +12,7 @@ ms.topic: tutorial ms.collection: - tier1 - highpri -ms.subservice: itpro-deploy +ms.subservice: autopilot appliesto: - ✅ Windows 11 - ✅ Windows 10 diff --git a/autopilot/user-driven.md b/autopilot/user-driven.md index a0d7751407d..3c96ea6a7d5 100644 --- a/autopilot/user-driven.md +++ b/autopilot/user-driven.md @@ -2,7 +2,7 @@ title: Windows Autopilot User-Driven Mode description: With Windows Autopilot user-driven mode, devices can be configured to deploy to a ready-to-use state without requiring help from IT personnel. ms.service: windows-client -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.localizationpriority: medium author: frankroj ms.author: frankroj diff --git a/autopilot/whats-new.md b/autopilot/whats-new.md index f67f1099ee7..ca690e1231a 100644 --- a/autopilot/whats-new.md +++ b/autopilot/whats-new.md @@ -2,7 +2,7 @@ title: What's new in Windows Autopilot description: News and resources about the latest updates and past versions of Windows Autopilot. # RSS subscription is based on this description so don't change. If the description needs to change, update RSS URL in the Tip in the article. ms.service: windows-client -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.localizationpriority: medium author: frankroj ms.author: frankroj diff --git a/autopilot/windows-autopilot-hybrid.md b/autopilot/windows-autopilot-hybrid.md index 1ab16a7ec76..73ada90527f 100644 --- a/autopilot/windows-autopilot-hybrid.md +++ b/autopilot/windows-autopilot-hybrid.md @@ -9,7 +9,7 @@ ms.reviewer: jubaptis ms.date: 08/22/2024 ms.topic: how-to ms.service: windows-client -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.localizationpriority: medium ms.collection: - M365-identity-device-management diff --git a/autopilot/windows-autopilot-reset.md b/autopilot/windows-autopilot-reset.md index c6835ee85a1..a4c332f4405 100644 --- a/autopilot/windows-autopilot-reset.md +++ b/autopilot/windows-autopilot-reset.md @@ -1,7 +1,7 @@ --- title: Windows Autopilot Reset description: Windows Autopilot Reset takes the device back to a business-ready state, allowing the next user to sign in and get productive quickly and easily. -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.service: windows-client ms.localizationpriority: medium author: frankroj diff --git a/autopilot/windows-autopilot-scenarios.md b/autopilot/windows-autopilot-scenarios.md index bc6700e0deb..6846ae50ec3 100644 --- a/autopilot/windows-autopilot-scenarios.md +++ b/autopilot/windows-autopilot-scenarios.md @@ -2,7 +2,7 @@ title: Windows Autopilot scenarios and capabilities description: Follow along with several typical Windows Autopilot deployment scenarios, such as redeploying a device in a business-ready state. ms.service: windows-client -ms.subservice: itpro-deploy +ms.subservice: autopilot ms.localizationpriority: medium author: frankroj ms.author: frankroj diff --git a/memdocs/intune/fundamentals/in-development.md b/memdocs/intune/fundamentals/in-development.md index e227dacaeef..c609dd159bf 100644 --- a/memdocs/intune/fundamentals/in-development.md +++ b/memdocs/intune/fundamentals/in-development.md @@ -7,7 +7,7 @@ keywords: author: dougeby ms.author: dougeby manager: dougeby -ms.date: 08/12/2024 +ms.date: 08/19/2024 ms.topic: conceptual ms.service: microsoft-intune ms.subservice: fundamentals @@ -72,20 +72,8 @@ Applies to: For information about using EPM, see [Endpoint Privilege Management overview](../protect/epm-overview.md). -### Resource performance report for physical devices in Advanced Analytics - -We're introducing a Resource performance report for Windows physical devices in Intune Advanced Analytics. The report will be included as an Intune-add on under Microsoft Intune Suite. - -The resource performance scores and insights for physical devices are aimed to help IT admins make CPU/RAM asset management and purchase decisions that improve the user experience while balancing hardware costs. - -For more information, see [Microsoft Intune Suite](../fundamentals/intune-add-ons.md). - ## App management -### Managed Home Screen for Android Enterprise Fully Managed devices - -Managed Home Screen (MHS) will be supported on Android Enterprise Fully Managed devices. This capability will offer organizations the ability to leverage MHS in scenarios where a device is associated with a single user. - ### Added protection for iOS/iPadOS app widgets To protect organizational data for MAM managed accounts and apps, Intune app protection policies now provide the capability to block data sync from policy managed app data to app widgets. App widgets can be added to end-user's iOS/iPadOS device lock screen, which can expose data contained by these widgets, such as meeting titles, top sites, and recent notes. In Intune, you'll be able to set the app protection policy setting **Sync policy managed app data with app widgets** to **Block** for iOS/iPadOS apps. This setting will be available as part of the **Data Protection** settings in app protection policies. This new setting will be an app protection feature similar to the **Sync policy managed app data with native app or add-ins** setting. @@ -96,128 +84,13 @@ Applies to: -## Device configuration - -### Enhancements to multiple administrative approval - -Multi administrative approval (MAA) adds the ability to limit application access policies to Windows applications or all non-Windows applications or both. We're adding a new access policy to the multiple administrative approval feature. - -For more information, see [multiple admin approval](../fundamentals/multi-admin-approval.md). - -### New settings available in the Apple settings catalog - -The [Settings Catalog](../configuration/settings-catalog.md) lists all the settings you can configure in a device policy, and all in one place. For more information about configuring Settings Catalog profiles in Intune, see [Create a policy using settings catalog](../configuration/settings-catalog.md). - -There are new settings in the Apple Settings Catalog. To see these settings, in the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Devices** > **Manage devices** > **Configuration** > **Create** > **New policy** > **iOS/iPadOS** or **macOS** for platform > **Settings catalog** for profile type. - -#### iOS/iPadOS - -**Declarative Device Management (DDM) > Safari Extension Settings**: - -- Managed Extensions - - Allowed Domains - - Denied Domains - - Private Browsing - - State - -**Declarative Device Management (DDM) > Software Update Settings**: - -- Automatic Actions - - Download - - Install OS Updates - -- Deferrals - - Combined Period In Days - -- Notifications - -- Rapid Security Response - - Enable - - Enable Rollback - -- Recommended Cadence - -**Restrictions**: - -- Allow ESIM Outgoing Transfers -- Allow Personalized Handwriting Results -- Allow Video Conferencing Remote Control -- Allow Genmoji -- Allow Image Playground -- Allow Image Wand -- Allow iPhone Mirroring -- Allow Writing Tools - -#### macOS - -**Authentication > Extensible Single Sign On (SSO)**: - -- Platform SSO - - Authentication Grace Period - - FileVault Policy - - Non Platform SSO Accounts - - Offline Grace Period - - Unlock Policy - -**Authentication > Extensible Single Sign On Kerberos**: - -- Allow Password -- Allow SmartCard -- Identity Issuer Auto Select Filter -- Start In Smart Card Mode - -**Declarative Device Management (DDM) > Disk Management**: - -- External Storage -- Network Storage - -**Declarative Device Management (DDM) > Safari Extension Settings**: - -- Managed Extensions - - Allowed Domains - - Denied Domains - - Private Browsing - - State - -**Declarative Device Management (DDM) > Software Update Settings**: - -- Allow Standard User OS Updates - -- Automatic Actions - - Download - - Install OS Updates - - Install Security Update - -- Deferrals - - Major Period In Days - - Minor Period In Days - - System Period In Days - -- Notifications - -- Rapid Security Response - - Enable - - Enable Rollback - -**Restrictions**: + -- Allow Genmoji -- Allow Image Playground -- Allow iPhone Mirroring -- Allow Writing Tools - -**System Policy > System Policy Control**: - -- Enable XProtect Malware Upload ## Device enrollment -### Use corporate Microsoft Entra account to enable Android Enterprise management options in Intune - -Managing Intune-enrolled devices with Android Enterprise management options currently requires you to connect your Intune tenant to your managed Google Play account using a personal Gmail account. Soon you will be able to use a corporate Microsoft Entra account to establish the connection. This change is happening in new tenants, and doesn't affect tenants that have already established a connection. - ### Support ending for Apple User Enrollment with Company Portal After the release of iOS/iPadOS 18, Apple will no longer support profile-based Apple User Enrollment. As a result, Intune will end support for [user enrollment with Company Portal](../enrollment/apple-user-enrollment-with-company-portal.md) shortly after the release of iOS/iPadOS 18. @@ -233,16 +106,6 @@ To prepare, use a different management method to enroll devices. We recommend ac - [Set up account-driven Apple User Enrollment](../enrollment/apple-account-driven-user-enrollment.md) - [Set up web-based device enrollment for iOS/iPadOS](../enrollment/web-based-device-enrollment-ios.md) -### Account-driven Apple User Enrollment to be generally available for iOS/iPadOS 15+ devices - -Intune will support account-driven Apple User Enrollment, the new and improved version of Apple User Enrollment, for devices running iOS/iPadOS 15 and later. This new enrollment method utilizes just-in-time registration, removing the Company Portal app for iOS as an enrollment requirement. Device users will be able to initiate enrollment directly in the Settings app, resulting in a shorter and more efficient onboarding experience. For more information, see [Set up account driven Apple User Enrollment](../enrollment/apple-account-driven-user-enrollment.md) on Microsoft Learn. - -If you prefer, you can continue to target iOS/iPadOS devices using the Apple User Enrollment method that requires Company Portal. Devices running iOS/iPadOS 14.8.1 and earlier will be unaffected by this update and can continue to use the method with Company Portal. - -Applies to: - -- iOS/iPadOS 15 and later - ## Device management @@ -267,63 +130,16 @@ Later this year, we expect iOS18 and iPadOS 18 to be released by Apple. Microsof For more information on this change, see [Plan for change: Intune is moving to support iOS/iPadOS 16 and later](../fundamentals/whats-new.md#plan-for-change-intune-is-moving-to-support-iosipados-16-and-later). > [!NOTE] -> Userless iOS and iPadOS devices enrolled through Automated Device Enrollment (ADE) have a slightly nuanced support statement due to their shared usage. For more information, go to [Support statement for supported versus allowed iOS/iPadOS versions for user-less devices](https://aka.ms/ADE_userless_support). +> Userless iOS and iPadOS devices enrolled through Automated Device Enrollment (ADE) have a slightly nuanced support statement due to their shared usage. For more information, see [Support statement for supported versus allowed iOS/iPadOS versions for user-less devices](https://aka.ms/ADE_userless_support). Applies to: - iOS/iPadOS -### 21 Vianet support for Mobile Threat Defense connector support on 21Vianet - -Intune operated by 21Vianet will soon support Mobile Threat Defense (MTD) connectors for Android and iOS/iPadOS devices for MTD vendors that also have support in that environment. When an MTD partner is supported and you sign in to a 21Vianet tenant, the supported connectors will be available. - -Applies to: - -- Android -- iOS/iPadOS - -For more information, see: - -- [Intune operated by 21Vianet in China](../fundamentals/china.md) -- [Mobile Threat Defense integration with Intune](../protect/mobile-threat-defense.md) - -### New `cpuArchitecture` filter device property for app and policy assignments - -When you assign an app, compliance policy, or configuration profile, you can filter the assignment using different device properties, such as device manufacturer, operating system SKU, and more. - -A new `cpuArchitecture` device filter property is available for Windows and macOS devices. With this property, you can filter app and policy assignments depending on the processor architecture. - -For more information on filters and the device properties you can use, see: - -- [Use filters when assigning your apps, policies, and profiles in Microsoft Intune](filters.md) -- [Filter properties](filters-device-properties.md) -- [Supported workloads](filters-supported-workloads.md) - -Applies to: - -- Windows 10 -- Windows 11 -- macOS - ## Device security -### Target Date Time setting for Apple software update enforcement will schedule updates using the local time on devices - -You will be able to specify the time that OS updates are enforced on devices in their local time zone. For example, configuring an OS update to be enforced at 5pm will schedule the update for 5pm in the device's local time zone. Currently, this setting uses the time zone that the policy is configured. - -This change will only apply to new policies that are created in the August 2408 release and later. The **Target Date Time** setting is in the settings catalog at **Devices** > **Manage devices** > **Configuration** > **Create** > **New policy** > **iOS/iPadOS** or **macOS** for platform > **Settings catalog** for profile type > **Declarative Device Management** > Software Update. - -In a future release, the **UTC** text will be removed from the **Target Date Time** setting. - -For more information on using the settings catalog to configure software updates, see [Managed software updates with the settings catalog](../protect/managed-software-updates-ios-macos.md). - -Applies to: - -- iOS/iPadOS -- macOS - ### Defender for Endpoint security settings support in government cloud environments Customer tenants in US Government Community Cloud (GCC) High, and Department of Defense (DoD) environments will soon be able to use Intune to manage the Defender security settings on the devices you’ve onboarded to Defender without enrolling those devices with Intune. This capability is known as [Defender for Endpoint security settings management](../protect/mde-security-integration.md). diff --git a/memdocs/intune/fundamentals/manage-os-versions.md b/memdocs/intune/fundamentals/manage-os-versions.md index a3b0eb73f0b..9b0479b7420 100644 --- a/memdocs/intune/fundamentals/manage-os-versions.md +++ b/memdocs/intune/fundamentals/manage-os-versions.md @@ -1,14 +1,14 @@ --- # required metadata -title: Manage operating system versions of devices you manage with Intune +title: Manage device operating system versions with Intune titleSuffix: Microsoft Intune -description: Learn how to manage operating system versions across platforms with Microsoft Intune. +description: Learn about the methods for managing device operating system versions supported by Microsoft Intune. keywords: author: brenduns ms.author: brenduns manager: dougeby -ms.date: 10/04/2023 +ms.date: 08/23/2024 ms.topic: conceptual ms.service: microsoft-intune ms.subservice: fundamentals @@ -117,7 +117,7 @@ You can use the Intune capabilities described in this article to help you move y ## Next steps -Use the following resources to manage operating system versions in your organization: +Use the following resources to manage the operating system versions that are in use in your organization: - [Set device type restrictions](../enrollment/enrollment-restrictions-set.md) - [Get started with device compliance](../protect/device-compliance-get-started.md) diff --git a/memdocs/intune/fundamentals/whats-new-archive.md b/memdocs/intune/fundamentals/whats-new-archive.md index 958fc1c7d4f..6a7cadaf7c9 100644 --- a/memdocs/intune/fundamentals/whats-new-archive.md +++ b/memdocs/intune/fundamentals/whats-new-archive.md @@ -33,7 +33,340 @@ ms.collection: [!INCLUDE [azure_portal](../includes/azure_portal.md)] - + + +## Week of March 3, 2024 + +### Device enrollment + +#### Role-based access control changes to enrollment settings for Windows Hello for Business + +We updated Role-based access control (RBAC) in the enrollment area for Windows Hello for Business. Enrollment settings related to Windows Hello for Business are read-only for all roles except the Intune Service Administrator. The Intune Service Administrator can create and edit Windows Hello for Business enrollment settings. + +For more information, see [Role-based access control](../protect/windows-hello.md#role-based-access-control) in the *Windows Hello at device enrollment* article. + +### Device security + +#### New enrollment configuration for Windows Hello for Business + +A new Windows Hello for Business enrollment setting, **Enable enhanced sign in security** is available in the Intune admin center. Enhanced sign-in security is a Windows Hello feature that prevents malicious users from gaining access to a user's biometrics through external peripherals. + +For more information about this setting, see [Create a Windows Hello for Business policy](../protect/windows-hello.md). + +#### HTML formatting supported in noncompliance email notifications + +Intune now supports HTML formatting in noncompliance email notifications for all platforms. You can use supported HTML tags to add formatting such as italics, URL links, and bulleted lists to your organization's messages. + +For more information, see [Create a notification message template](../protect/actions-for-noncompliance.md#create-a-notification-message-template). + +## Week of February 26, 2024 + +### Microsoft Intune Suite + +#### New Microsoft Cloud PKI service + +Use the Microsoft Cloud PKI service to simplify and automate certificate lifecycle management for Intune-managed devices. ​Microsoft Cloud PKI is a feature component of the Microsoft Intune Suite and is also available as a standalone [Intune add-on](../fundamentals/intune-add-ons.md). The cloud-based service provides a dedicated PKI infrastructure for your organization, and doesn't require on-premises servers, connectors, or hardware. Microsoft Cloud PKI automatically issues, renews, and revokes certificates for all OS platforms supporting the SCEP certificate device configuration profile. Issued certificates can be used for certificate-based authentication for Wi-Fi, VPN, and other services supporting certificate-based authentication. For more information, see [Overview of Microsoft Cloud PKI](../protect/microsoft-cloud-pki-overview.md). + +Applies to: + +- Windows +- Android +- iOS/iPadOS +- macOS + +### Intune apps + +#### Newly available protected app for Intune + +The following protected app is now available for Microsoft Intune: + +- Cinebody by Super 6 LLC + +For more information about protected apps, see [Microsoft Intune protected apps](../apps/apps-supported-intune-apps.md). + +## Week of February 19, 2024 (Service release 2402) + +### App management + +#### More app configuration permissions for Android apps + +There are six new permissions that can be configured for an Android app using an app configuration policy. They are: + +- Allow background body sensor data +- Media Video (read) +- Media Images (read) +- Media Audio (read) +- Nearby Wifi Devices +- Nearby Devices + +For more information about how to use app config policies for Android apps, see [Add app configuration policies for managed Android Enterprise devices](../apps/app-configuration-policies-use-android.md). + +#### Newly available protected apps for Intune + +The following protected apps are now available for Microsoft Intune: + +- Bob HR by Hi Bob Ltd +- ePRINTit SaaS by ePRINTit USA LLC +- Microsoft Copilot by Microsoft Corporation + +For more information about protected apps, see [Microsoft Intune protected apps](../apps/apps-supported-intune-apps.md). + +#### Update to Intune Management Extension on Windows + +To support expanded functionality and bug fixes, use .NET Framework 4.7.2 or higher with the Intune Management Extension on Windows clients. If a Windows client continues to use an earlier version of the .NET Framework, the Intune Management Extension continues to function. The .NET Framework 4.7.2 is available from Windows Update as of July 10, 2018, which is included in Windows 10 1809 (RS5) and newer. Multiple versions of the .NET Framework can coexist on a device. + +Applies to: + +- Windows 10 +- Windows 11 + +### Device configuration + +#### Use assignment filters on Endpoint Privilege Management (EPM) policies + +You can use assignment filters to assign a policy based on rules you create. A filter allows you to narrow the assignment scope of a policy, like targeting devices with a specific OS version or a specific manufacturer. + +You can use filters on Endpoint Privilege Management (EPM) policies. + +For more information, see: + +- [Use filters when assigning your apps, policies, and profiles in Intune](filters.md) +- [List of platforms, policies, and app types supported by filters in Intune](filters-supported-workloads.md) + +Applies to: + +- Windows 10 +- Windows 11 + +#### New settings available in the Apple settings catalog + +The [Settings Catalog](../configuration/settings-catalog.md) lists all the settings you can configure in a device policy, and all in one place. + +There are new settings in the Settings Catalog. To see these settings, in the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Devices** > **Manage devices** > **Configuration** > **Create** > **New policy** > **iOS/iPadOS** or **macOS** for platform > **Settings catalog** for profile type. + +##### iOS/iPadOS + +- **Restrictions** + + - Allow Live Voicemail + - Force Classroom Unprompted Screen Observation + - Force Preserve ESIM On Erase + +##### macOS + +- **Full Disk Encryption > FileVault** > Force Enable In Setup Assistant +- **Restrictions** > Force Classroom Unprompted Screen Observation + +For more information, see: + +- [Use FileVault disk encryption for macOS with Intune](../protect/encrypt-devices-filevault.md) +- [Create a policy using settings catalog](../configuration/settings-catalog.md) + +#### Import up to 20 custom ADMX and ADML administrative templates + +You can import custom ADMX and ADML administrative templates in Microsoft Intune. Previously, you could import up to 10 files. Now, you can upload up to 20 files. + +Applies to: + +- Windows 10 +- Windows 11 + +For more information on this feature, see [Import custom ADMX and ADML administrative templates into Microsoft Intune (public preview)](../configuration/administrative-templates-import-custom.md). + +#### New setting for updating MAC address randomization on Android Enterprise devices + +There's a new **MAC address randomization** setting on Android Enterprise devices (**Devices** > **Manage devices** > **Configuration** > **Create** > **New policy** > **Android Enterprise** for platform > **Fully Managed, Dedicated, and Corporate-Owned Work Profile** > **Wi-Fi** for profile type). + +Starting with Android 10, when connecting to a network, devices present a randomized MAC address instead of the physical MAC address. Using randomized MAC addresses is recommended for privacy, as it's harder to track a device by its MAC address. However, randomized MAC addresses break functionality that relies on a static MAC address, including network access control (NAC). + +Your options: + +- **Use device default**: Intune doesn't change or update this setting. By default, when connecting to a network, devices present a randomized MAC address instead of the physical MAC address. Any updates made by the user to the setting persist. + +- **Use randomized MAC**: Enables MAC address randomization on devices. When devices connect to a new network, devices present a randomized MAC address, instead of the physical MAC address. If the user changes this value on their device, it resets to **Use randomized MAC** on the next Intune sync. + +- **Use device MAC**: Forces devices to present their actual Wi-Fi MAC address instead of a random MAC address. This setting allows devices to be tracked by their MAC address. Only use this value when necessary, such as for network access control (NAC) support. If the user changes this value on their device, it resets to **Use device MAC** on the next Intune sync. + +Applies to: + +- Android 13 and newer + +For more information on the Wi-Fi settings you can configure, see [Add Wi-Fi settings for Android Enterprise dedicated and fully managed devices in Microsoft Intune](../configuration/wi-fi-settings-android-enterprise.md). + +#### Turn Off Copilot in Windows setting in the Windows settings catalog + +The [Settings Catalog](../configuration/settings-catalog.md) lists all the settings you can configure in a device policy, and all in one place. + +There's a new setting in the Settings Catalog. To see this setting, in the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Devices** > **Manage devices** > **Configuration** > **Create** > **New policy** > **Windows** for platform > **Settings catalog** for profile type. + +- **Windows AI > Turn Off Copilot in Windows (User)** + + - If you enable this policy setting, users can't use Copilot. The Copilot icon won't appear on the taskbar. + - If you disable or don't configure this policy setting, users can use Copilot when it's available to them. + +This setting uses the [Policy CSP - WindowsAI](/windows/client-management/mdm/policy-csp-windowsai). + +For more information about configuring Settings Catalog policies in Intune, including user scope vs. device scope, see [Create a policy using settings catalog](../configuration/settings-catalog.md). + +Applies to: + +- Windows 10 and later + +#### Windows Autopilot self-deploying mode is now generally available + +Windows Autopilot self-deploying mode is now generally available and out of preview. Windows Autopilot self-deploying mode enables you to deploy Windows devices with little to no user interaction. Once the device connects to network, the device provisioning process starts automatically: the device joins Microsoft Entra ID, enrolls in Intune, and syncs all device-based configurations targeted to the device. Self-deploying mode ensures that the user can't access desktop until all device-based configuration is applied. The Enrollment Status Page (ESP) is displayed during OOBE so users can track the status of the deployment. For more information, see: + +- [Windows Autopilot self-deploying mode](/autopilot/self-deploying) +- [Step by step tutorial for Windows Autopilot self-deploying mode in Intune](/autopilot/tutorial/self-deploying/self-deploying-workflow) + +This information is also published in [Windows Autopilot: What's new](/autopilot/whats-new). + +#### Windows Autopilot for pre-provisioned deployment is now generally available + +Windows Autopilot for pre-provisioned deployment is now generally available and out of preview. Windows Autopilot for pre-provisioned deployment is used by organizations that want to ensure devices are business-ready before the user accesses them. With pre-provisioning, admins, partners, or OEMs can access a technician flow from the Out-of-box experience (OOBE) and kick off device setup. Next, the device is sent to the user who completes provisioning in the user phase. Pre-provisioning delivers most the configuration in advance so the end user can get to the desktop faster. For more information, see: + +- [Windows Autopilot for pre-provisioned deployment](/autopilot/pre-provision). +- [Step by step tutorial for Windows Autopilot for pre-provisioned deployment Microsoft Entra join in Intune](/autopilot/tutorial/pre-provisioning/azure-ad-join-workflow) +- [Step by step tutorial for Windows Autopilot for pre-provisioned deployment Microsoft Entra hybrid join in Intune](/autopilot/tutorial/pre-provisioning/hybrid-azure-ad-join-workflow). + +This information is also published in [Windows Autopilot: What's new](/autopilot/whats-new). + +### Device enrollment + +#### ESP setting to install required apps during Windows Autopilot pre-provisioning + +The setting **Only fail selected blocking apps in technician phase** is now generally available to configure in Enrollment Status Page (ESP) profiles. This setting only appears in ESP profiles that have *blocking apps* selected. + +For more information, see [Set up the Enrollment Status Page](../enrollment/windows-enrollment-status.md#create-new-profile). + +#### New local primary account configuration for macOS automated device enrollment + +Configure local primary account settings for Macs enrolling in Intune via Apple automated device enrollment. These settings, supported on devices running macOS 10.11 and later, are available in new and existing enrollment profiles under the new **Account Settings** tab. For this feature to work, the enrollment profile must be configured with user-device affinity and one of the following authentication methods: + +- Setup Assistant with modern authentication +- Setup Assistant (legacy) + +Applies to: + +- macOS 10.11 and later + +For more information about macOS account settings, see [Create an Apple enrollment profile in Intune](../enrollment/device-enrollment-program-enroll-macos.md#create-an-apple-enrollment-profile). + +#### Await final configuration for macOS automated device enrollment now generally available + +Now generally available, *await final configuration* enables a locked experience at the end of Setup Assistant to ensure that critical device configuration policies are installed on devices. The locked experience works on devices targeted with new and existing enrollment profiles, enrolling via one of these authentication methods: + +- Setup Assistant with modern authentication +- Setup Assistant (legacy) +- Without user device affinity + +Applies to: + +- macOS 10.11 and later + +For information about how to enable await final configuration, see [Create an Apple enrollment profile](../enrollment/device-enrollment-program-enroll-macos.md#create-an-apple-enrollment-profile). + +### Device management + +#### AOSP devices check for new tasks and notifications approximately every 15 minutes + +On devices enrolled with Android (AOSP) management, Intune attempts to check for new tasks and notifications approximately every 15 minutes. To use this feature, devices must be using the Intune app version 24.02.4 or newer. + +Applies to: + +- Android (AOSP) + +For more information, see: + +- [How to use Intune in environments without Google Mobile Services](../apps/manage-without-gms.md#some-tasks-can-be-delayed) +- [Policy refresh intervals in Intune](../configuration/device-profile-troubleshoot.md#policy-refresh-intervals) + +#### New device management experience for Government clouds in Microsoft Intune + +In government clouds, there's a new device management experience in the Intune admin center. The **Devices** area now has a more consistent UI, with more capable controls and an improved navigation structure so you can find what you need faster. + +If you want to try the new experience before your tenant is updated, go to **Devices** > **Overview**, select the **Preview upcoming changes to Devices and provide feedback** notification banner, and select **Try it now**. + +#### Bulk approval of drivers + +Bulk actions are now available for Windows Driver update policies. With bulk actions, multiple driver updates can be approved, paused, or declined at the same time, saving time and effort. + +When you bulk approve drivers, the date for when the drivers become available to applicable devices can also be set, enabling drivers to be installed together. + +Applies to: + +- Windows 10 +- Windows 11 + +For more information, see [Bulk driver updates](../protect/windows-driver-updates-policy.md#bulk-driver-updates). + +#### App Control for Business policy limitation is resolved + +A previously documented limitation for App Control for Business policy (WDAC), that limited the number of active policies per device to 32, is resolved by Windows. The issue involves a potential [Boot stop failure when more than 32 policies are active](/windows/security/application-security/application-control/windows-defender-application-control/operations/known-issues#boot-stop-failure-blue-screen-occurs-if-more-than-32-policies-are-active) on a device. + +This issue is resolved for devices that run Windows 10 1903 or later with a Windows security update released on or after March 12, 2024. Older versions of Windows can expect to receive this fix in future Windows security updates. + +Applies to: + +- Windows 10 version 1903 and later + +To learn more about App Control for Business policy for Intune, see [Manage approved apps for Windows devices with App Control for Business policy and Managed Installers for Microsoft Intune](../protect/endpoint-security-app-control-policy.md). + +### Tenant administration + +#### Customization pane support for excluding groups + +The Customization pane now supports selecting groups to exclude when assigning policies. You can find this setting in the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) by selecting **Tenant administration** > **Customization**. + +For more information, see [Assign policies in Microsoft Intune](../configuration/device-profile-assign.md). + +## Week of January 29, 2024 + +### Microsoft Intune Suite + +#### Microsoft Intune Enterprise Application Management + +Enterprise Application Management provides an Enterprise App Catalog of Win32 applications that are easily accessible in Intune. You can add these applications to your tenant by selecting them from the Enterprise App Catalog. When you add an Enterprise App Catalog app to your Intune tenant, default installation, requirements, and detection settings are automatically provided. You can modify these settings as well. Intune hosts Enterprise App Catalog apps in Microsoft storage. + +For more information, see: + +- [Use Intune Suite add-on capabilities](../fundamentals/intune-add-ons.md) +- [Microsoft Intune Enterprise Application Management](../apps/apps-enterprise-app-management.md) +- [Add an Enterprise App Catalog app to Microsoft Intune](../apps/apps-add-enterprise-app.md) + +#### Microsoft Intune Advanced Analytics + +Intune Advanced Analytics provides comprehensive visibility of the end-user experience in your organization and optimizes it with data driven insights. It includes near real-time data about your devices with Device query, increased visibility with custom device scopes, a battery health report and a detailed device timeline for troubleshooting device issues, and anomaly detection to help identify potential vulnerabilities or risks across your device estate. + +- **Battery health report** + + The battery health report provides visibility into the health of batteries in your organization's devices and its influence on user experience. The scores and insights in this report are aimed to help IT admins with asset management and purchase decisions that improve user experience while balancing hardware costs. + +- **Run on-demand device queries on single devices** + + Intune allows you to quickly gain on-demand information about the state of your device. When you enter a query on a selected device, Intune runs a query in real time. + + The data returned can then be used to respond to security threats, troubleshoot the device, or make business decisions. + + Applies to: + + - Windows devices + +Intune Advanced Analytics is part of the Microsoft Intune Suite. For added flexibility, this new set of capabilities, together with the existing Advanced Analytics features, is also now available as an individual add-on to Microsoft subscriptions that include Intune. + +To use Device query and battery health report in your tenant, or any of the existing Advanced Analytics capabilities, you must have a license for either: + +- The Intune Advanced Analytics add-on +- The Microsoft Intune Suite add-on + +For more information, see: + +- [Use Intune Suite add-on capabilities](../fundamentals/intune-add-ons.md) +- [Microsoft Intune Advanced Analytics](../../analytics/advanced-endpoint-analytics.md) +- [Battery health](../../analytics/battery-health.md) +- [Device query](../../analytics/device-query.md) ## Week of January 22, 2024 (Service release 2401) diff --git a/memdocs/intune/fundamentals/whats-new.md b/memdocs/intune/fundamentals/whats-new.md index 0508686e8b0..3741206c101 100644 --- a/memdocs/intune/fundamentals/whats-new.md +++ b/memdocs/intune/fundamentals/whats-new.md @@ -7,7 +7,7 @@ keywords: author: brenduns ms.author: brenduns manager: dougeby -ms.date: 08/02/2024 +ms.date: 08/19/2024 ms.topic: conceptual ms.service: microsoft-intune ms.subservice: fundamentals @@ -76,18 +76,312 @@ You can use RSS to be notified when this page is updated. For more information, --> +## Week of August 19, 2024 (Service release 2408) + +### Microsoft Intune Suite + +#### Easy creation of Endpoint Privilege Management elevation rules from support approval requests and reports + +You can now create Endpoint Privilege Management (EPM) elevation rules directly from a support approved elevation request or from details found in the EPM Elevation report. With this new capability, you won’t need to manually identify specific file detection details for elevation rules. Instead, for files that appear in the Elevation report or a support approved elevation request, you can select that file to open its elevation detail pane, and then select the option to **Create a rule with these file details**. + +When you use this option, you can then choose to add the new rule to one of your existing elevation policies, or create a new policy with only the new rule. + +Applies to: + +- Windows 10 +- Windows 11 + +For information about this new capability, see [Windows elevation rules policy](../protect/epm-policies.md) in the *Configure policies for Endpoint Privilege management* article. + +#### Introducing the Resource performance report for physical devices in Advanced Analytics + +We're introducing the Resource performance report for Windows physical devices in Intune Advanced Analytics. The report is included as an Intune-add on under Microsoft Intune Suite. + +The resource performance scores and insights for physical devices are aimed to help IT admins make CPU/RAM asset management and purchase decisions that improve the user experience while balancing hardware costs. + +For more information, see: + +- [Resource Performance Report](../../analytics/resource-performance-report.md) +- [Microsoft Intune Suite](../fundamentals/intune-add-ons.md) + +### App management + +#### Managed Home Screen for Android Enterprise Fully Managed devices + +Managed Home Screen (MHS) is now supported on Android Enterprise Fully Managed devices. This capability offers organizations the ability to leverage MHS in scenarios where a device is associated with a single user. + +For related information, see: + +- [Configure the Microsoft Managed Home Screen app for Android Enterprise](../apps/app-configuration-managed-home-screen-app.md) +- [Android Enterprise device settings list to allow or restrict features on corporate-owned devices using Intune](../configuration/device-restrictions-android-for-work.md) +- [Configure permissions for the Managed Home Screen (MHS) on Android Enterprise devices using Microsoft Intune](../configuration/oemconfig-managed-home-screen-permissions-android.md) + +#### Updates to the Discovered Apps report + +The **Discovered Apps** report, which provides a list of detected apps that are on Intune enrolled devices for your tenant, now provides publisher data for Win32 apps, in addition to Store apps. Rather than providing publisher information only in the exported report data, we are including it as a column in the **Discovered Apps** report. + +For more information, see [Intune Discovered apps](../apps/app-discovered-apps.md#monitor-discovered-apps-with-intune). + +#### Improvements to Intune Management Extension logs + +We have updated how log activities and events are made for Win32 apps and the Intune Management Extension (IME) logs. A new log file (*AppWorkload.log*) contains all logging information related to app deployment activities conducted by the IME. These improvements provide better troubleshooting and analysis of app management events on the client. + +For more information, see [Intune management extension logs](../apps/intune-management-extension.md#intune-management-extension-logs). + +### Device configuration + +#### New settings available in the Apple settings catalog + +The [Settings Catalog](../configuration/settings-catalog.md) lists all the settings you can configure in a device policy, and all in one place. For more information about configuring Settings Catalog profiles in Intune, see [Create a policy using settings catalog](../configuration/settings-catalog.md). + +There are new settings in the Apple Settings Catalog. To see these settings, in the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Devices** > **Manage devices** > **Configuration** > **Create** > **New policy** > **iOS/iPadOS** or **macOS** for platform > **Settings catalog** for profile type. + +##### iOS/iPadOS + +**Declarative Device Management (DDM) > Safari Extension Settings**: + +- Managed Extensions + - Allowed Domains + - Denied Domains + - Private Browsing + - State + +**Declarative Device Management (DDM) > Software Update Settings**: + +- Automatic Actions + - Download + - Install OS Updates + +- Deferrals + - Combined Period In Days + +- Notifications + +- Rapid Security Response + - Enable + - Enable Rollback + +- Recommended Cadence + +**Restrictions**: + +- Allow ESIM Outgoing Transfers +- Allow Personalized Handwriting Results +- Allow Video Conferencing Remote Control +- Allow Genmoji +- Allow Image Playground +- Allow Image Wand +- Allow iPhone Mirroring +- Allow Writing Tools + +##### macOS + +**Authentication > Extensible Single Sign On (SSO)**: + +- Platform SSO + - Authentication Grace Period + - FileVault Policy + - Non Platform SSO Accounts + - Offline Grace Period + - Unlock Policy + +**Authentication > Extensible Single Sign On Kerberos**: + +- Allow Password +- Allow SmartCard +- Identity Issuer Auto Select Filter +- Start In Smart Card Mode + +**Declarative Device Management (DDM) > Disk Management**: + +- External Storage +- Network Storage + +**Declarative Device Management (DDM) > Safari Extension Settings**: + +- Managed Extensions + - Allowed Domains + - Denied Domains + - Private Browsing + - State + +**Declarative Device Management (DDM) > Software Update Settings**: + +- Allow Standard User OS Updates + +- Automatic Actions + - Download + - Install OS Updates + - Install Security Update + +- Deferrals + - Major Period In Days + - Minor Period In Days + - System Period In Days + +- Notifications + +- Rapid Security Response + - Enable + - Enable Rollback + +**Restrictions**: + +- Allow Genmoji +- Allow Image Playground +- Allow iPhone Mirroring +- Allow Writing Tools + +**System Policy > System Policy Control**: + +- Enable XProtect Malware Upload + +#### Enhancements to multi administrative approval + +Multi administrative approval adds the ability to limit application access policies to Windows applications or all non-Windows applications or both. We're adding a new access policy to the multiple administrative approval feature to allow approvals for changes to multiple administrative approval. + +For more information, see [Multi admin approval](../fundamentals/multi-admin-approval.md). + +### Device enrollment + +#### Account-driven Apple User Enrollment now generally available for iOS/iPadOS 15+ + +Intune now supports account-driven Apple User Enrollment, the new, and improved version of Apple User Enrollment, for devices running iOS/iPadOS 15 and later. This new enrollment method utilizes just-in-time registration, removing the Company Portal app for iOS as an enrollment requirement. Device users can initiate enrollment directly in the Settings app, resulting in a shorter and more efficient onboarding experience. + +For more information, see [Set up account driven Apple User Enrollment](../enrollment/apple-account-driven-user-enrollment.md) on Microsoft Learn. + +Apple has announced they are ending support for profile-based Apple User Enrollment. As a result, Microsoft Intune will end support for Apple User Enrollment with Company Portal shortly after the release of iOS/iPadOS 18. We recommend enrolling devices with account-driven Apple User Enrollment for similar functionality and an improved user experience. + +#### Use corporate Microsoft Entra account to enable Android Enterprise management options in Intune + +Managing Intune-enrolled devices with Android Enterprise management options previously required you to connect your Intune tenant to your managed Google Play account using an enterprise Gmail account. Now you can use a corporate Microsoft Entra account to establish the connection. This change is happening in new tenants, and doesn't affect tenants that have already established a connection. + +For more information, see [Connect Intune account to Managed Google Play account - Microsoft Intune | Microsoft Learn](../enrollment/connect-intune-android-enterprise.md). + +### Device management + +#### 21 Vianet support for Mobile Threat Defense connectors + +Intune operated by 21Vianet now supports Mobile Threat Defense (MTD) connectors for Android and iOS/iPadOS devices for MTD vendors that also have support in that environment. When an MTD partner is supported and you sign in to a 21Vianet tenant, the supported connectors are available. + +Applies to: + +- Android +- iOS/iPadOS + +For more information, see: + +- [Intune operated by 21Vianet in China](../fundamentals/china.md) +- [Mobile Threat Defense integration with Intune](../protect/mobile-threat-defense.md) + +#### New `cpuArchitecture` filter device property for app and policy assignments + +When you assign an app, compliance policy, or configuration profile, you can filter the assignment using different device properties, such as device manufacturer, operating system SKU, and more. + +A new `cpuArchitecture` device filter property is available for Windows and macOS devices. With this property, you can filter app and policy assignments depending on the processor architecture. + +For more information on filters and the device properties you can use, see: + +- [Use filters when assigning your apps, policies, and profiles in Microsoft Intune](filters.md) +- [Filter properties](filters-device-properties.md) +- [Supported workloads](filters-supported-workloads.md) + +Applies to: + +- Windows 10 +- Windows 11 +- macOS + +### Device security + +#### Windows platform name change for endpoint security policies + +When you create an endpoint security policy in Intune, you can select the Windows platform. For multiple templates in endpoint security, there are now only two options to choose for the Windows platform: **Windows** and **Windows (ConfigMgr)**. + +Specifically, the platform name changes are: + +| Original | New | +| --- | --- | +| Windows 10 and later​ | Windows | +| Windows 10 and later (ConfigMgr)​ | Windows (ConfigMgr)​ | +| Windows 10, Windows 11, and Windows Server | Windows | +| Windows 10, Windows 11, and Windows Server​ (ConfigMgr) | Windows (ConfigMgr)​ | + +These changes apply to the following policies: + +- Antivirus +- Disk encryption +- Firewall +- Endpoint Privilege Management +- Endpoint detection and response +- Attack surface reduction +- Account protection + +##### What you need to know + +- This change is only in the user experience (UX) that admins see when they create a new policy. There is no effect on devices. +- The functionally is the same as the previous platform names. +- There are no additional tasks or actions for existing policies. + +For more information on endpoint security features in Intune, see [Manage endpoint security in Microsoft Intune](../protect/endpoint-security.md). + +Applies to: + +- Windows + +#### Target Date Time setting for Apple software update enforcement schedules updates using the local time on devices + +You can specify the time that OS updates are enforced on devices in their local time zone. For example, configuring an OS update to be enforced at 5pm schedules the update for 5pm in the device's local time zone. Previously, this setting used the time zone of the browser where the policy was configured. + +This change only applies to new policies that are created in the August 2408 release and later. The **Target Date Time** setting is in the settings catalog at **Devices** > **Manage devices** > **Configuration** > **Create** > **New policy** > **iOS/iPadOS** or **macOS** for platform > **Settings catalog** for profile type > **Declarative Device Management** > Software Update. + +In a future release, the **UTC** text will be removed from the **Target Date Time** setting. + +For more information on using the settings catalog to configure software updates, see [Managed software updates with the settings catalog](../protect/managed-software-updates-ios-macos.md). + +Applies to: + +- iOS/iPadOS +- macOS + +### Intune Apps + +#### Newly available protected apps for Intune + +The following protected apps are now available for Microsoft Intune: + +- Singletrack for Intune (iOS) by Singletrack +- 365Pay by 365 Retail Markets +- Island Browser for Intune (Android) by Island Technology, Inc. +- Recruitment.Exchange by Spire Innovations, Inc. +- Talent.Exchange by Spire Innovations, Inc. + +For more information about protected apps, see [Microsoft Intune protected apps](../apps/apps-supported-intune-apps.md). + +### Tenant administration + +#### Organizational messages now in Microsoft 365 admin center + +The organizational message feature has moved out of the Microsoft Intune admin center and into its new home in the Microsoft 365 admin center. All organizational messages you created in Microsoft Intune are now in the Microsoft 365 admin center, where you can continue to view and manage them. The new experience includes highly requested features such as the ability to author custom messages, and deliver messages on Microsoft 365 apps. + +For more information, see: + +- [Introducing organizational messages (preview) in the Microsoft 365 admin center](https://techcommunity.microsoft.com/t5/microsoft-365-blog/introducing-organizational-messages-preview-in-the-microsoft-365/ba-p/4123890) +- [Organizational messages in the Microsoft 365 admin center](/microsoft-365/admin/misc/organizational-messages-microsoft-365) +- [Support tip: Organizational messages is moving to Microsoft 365 admin center - Microsoft Community Hub](https://techcommunity.microsoft.com/t5/intune-customer-success/support-tip-organizational-messages-is-moving-to-microsoft-365/ba-p/4148332) + ## Week of July 29, 2024 ### Microsoft Intune Suite -#### Endpoint Privilege Management, Advanced Analytics, and Intune Plan 2 is available for GCC High and DoD +#### Endpoint Privilege Management, Advanced Analytics, and Intune Plan 2 is available for GCC High and DoD We are excited to announce that the following capabilities from the Microsoft Intune Suite are now supported in U.S. Government Community Cloud (GCC) High and U.S. Department of Defense (DoD) environments. Add-on capabilities: - [Endpoint Privilege Management](../protect/epm-overview.md) -- [Advanced Analytics](../../analytics/advanced-endpoint-analytics.md) - With this release, GCC High and DoD support for Advanced Endpoint Analytics not include the [*Device query*](../../analytics/device-query.md) functionality. +- [Advanced Analytics](../../analytics/advanced-endpoint-analytics.md) - With this release, GCC High and DoD support for Advanced Endpoint Analytics doesn't include the [*Device query*](../../analytics/device-query.md) functionality. Plan 2 capabilities: @@ -100,34 +394,32 @@ For more information, see: - [Use Microsoft Intune Suite add-on capabilities](../fundamentals/intune-add-ons.md) - [Microsoft Intune for US Government GCC service description](../fundamentals/intune-govt-service-description.md) -### Device enrollment +### Device enrollment -#### ACME protocol support for iOS/iPadOS and macOS enrollment -As we prepare to support managed device attestation in Intune, we are starting a phased rollout of an infrastructure change for new enrollments that includes support for the *Automated Certificate Management Environment (ACME) protocol*. Now when new Apple devices enroll, the management profile from Intune receives an ACME certificate instead of a SCEP certificate. ACME provides better protection than SCEP against unauthorized certificate issuance through robust validation mechanisms and automated processes, which helps reduce errors in certificate management. +#### ACME protocol support for iOS/iPadOS and macOS enrollment +As we prepare to support managed device attestation in Intune, we are starting a phased rollout of an infrastructure change for new enrollments that includes support for the *Automated Certificate Management Environment (ACME) protocol*. Now when new Apple devices enroll, the management profile from Intune receives an ACME certificate instead of a SCEP certificate. ACME provides better protection than SCEP against unauthorized certificate issuance through robust validation mechanisms and automated processes, which helps reduce errors in certificate management. Existing OS and hardware eligible devices do not get the ACME certificate unless they re-enroll. There is no change to the end user's enrollment experience, and no changes to the Microsoft Intune admin center. This change only impacts enrollment certificates and has no impact on any device configuration policies. -ACME is supported for Apple Device Enrollment and Apple Configurator enrollment methods. Eligible OS versions include: - -* iOS 16.0 or later - -* iPadOS 16.1 or later +ACME is supported for Apple Device Enrollment and Apple Configurator enrollment methods. Eligible OS versions include: -* macOS 13.1 or later +- iOS 16.0 or later +- iPadOS 16.1 or later +- macOS 13.1 or later ## Week of July 22, 2024 (Service release 2407) -### Microsoft Intune Suite +### Microsoft Intune Suite -#### New actions for Microsoft Cloud PKI +#### New actions for Microsoft Cloud PKI -The following actions have been added for Microsoft Cloud PKI issuing and root certification authorities (CA): +The following actions have been added for Microsoft Cloud PKI issuing and root certification authorities (CA): -* Delete: Delete a CA. -* Pause: Temporarily suspend use of a CA. -* Revoke: Revoke a CA certificate. +- Delete: Delete a CA. +- Pause: Temporarily suspend use of a CA. +- Revoke: Revoke a CA certificate. -You can access all new actions in the Microsoft Intune admin center and Graph API. For more information, see [Delete Microsoft Cloud PKI certification authority](../protect/microsoft-cloud-pki-delete.md). +You can access all new actions in the Microsoft Intune admin center and Graph API. For more information, see [Delete Microsoft Cloud PKI certification authority](../protect/microsoft-cloud-pki-delete.md). ### App management @@ -197,7 +489,7 @@ Applies to: - Android Enterprise Fully managed, dedicated and corporate-owned work profile -### Device enrollment +### Device enrollment #### New support for Red Hat Enterprise Linux @@ -219,7 +511,7 @@ For more information, see: #### Just-in-time registration and compliance remediation available for all iOS/iPadOS enrollments -You can now configure just-in-time (JIT) registration and JIT compliance remediation for all Apple iOS and iPadOS enrollments. These Intune-supported features improve the enrollment experience because they can take the place of the Intune Company Portal app for device registration and compliance checks. We recommend setting up JIT registration and compliance remediation for new enrollments, and to improve the experience for existing enrolled devices. For more information, see [Set up just in time registration in Microsoft Intune](../enrollment/set-up-just-in-time-registration.md). +You can now configure just-in-time (JIT) registration and JIT compliance remediation for all Apple iOS and iPadOS enrollments. These Intune-supported features improve the enrollment experience because they can take the place of the Intune Company Portal app for device registration and compliance checks. We recommend setting up JIT registration and compliance remediation for new enrollments, and to improve the experience for existing enrolled devices. For more information, see [Set up just in time registration in Microsoft Intune](../enrollment/set-up-just-in-time-registration.md). ### Device management @@ -1015,7 +1307,7 @@ Applies to ### Microsoft Intune Suite -#### New elevation type for Endpoint Privilege Management +#### New elevation type for Endpoint Privilege Management Endpoint Privilege Management has a new file elevation type, **support approved**. Endpoint Privilege Management is a feature component of the Microsoft Intune Suite and is also available as a standalone [Intune add-on](../fundamentals/intune-add-ons.md). @@ -1287,337 +1579,6 @@ The following protected apps are now available for Microsoft Intune: For more information about protected apps, see [Microsoft Intune protected apps](../apps/apps-supported-intune-apps.md). -## Week of March 3, 2024 - -### Device enrollment - -#### Role-based access control changes to enrollment settings for Windows Hello for Business - -We updated Role-based access control (RBAC) in the enrollment area for Windows Hello for Business. Enrollment settings related to Windows Hello for Business are read-only for all roles except the Intune Service Administrator. The Intune Service Administrator can create and edit Windows Hello for Business enrollment settings. - -For more information, see [Role-based access control](../protect/windows-hello.md#role-based-access-control) in the *Windows Hello at device enrollment* article. - -### Device security - -#### New enrollment configuration for Windows Hello for Business - -A new Windows Hello for Business enrollment setting, **Enable enhanced sign in security** is available in the Intune admin center. Enhanced sign-in security is a Windows Hello feature that prevents malicious users from gaining access to a user's biometrics through external peripherals. - -For more information about this setting, see [Create a Windows Hello for Business policy](../protect/windows-hello.md). - -#### HTML formatting supported in noncompliance email notifications - -Intune now supports HTML formatting in noncompliance email notifications for all platforms. You can use supported HTML tags to add formatting such as italics, URL links, and bulleted lists to your organization's messages. - -For more information, see [Create a notification message template](../protect/actions-for-noncompliance.md#create-a-notification-message-template). - -## Week of February 26, 2024 - -### Microsoft Intune Suite - -#### New Microsoft Cloud PKI service - -Use the Microsoft Cloud PKI service to simplify and automate certificate lifecycle management for Intune-managed devices. ​Microsoft Cloud PKI is a feature component of the Microsoft Intune Suite and is also available as a standalone [Intune add-on](../fundamentals/intune-add-ons.md). The cloud-based service provides a dedicated PKI infrastructure for your organization, and doesn't require on-premises servers, connectors, or hardware. Microsoft Cloud PKI automatically issues, renews, and revokes certificates for all OS platforms supporting the SCEP certificate device configuration profile. Issued certificates can be used for certificate-based authentication for Wi-Fi, VPN, and other services supporting certificate-based authentication. For more information, see [Overview of Microsoft Cloud PKI](../protect/microsoft-cloud-pki-overview.md). - -Applies to: - -- Windows -- Android -- iOS/iPadOS -- macOS - -### Intune apps - -#### Newly available protected app for Intune - -The following protected app is now available for Microsoft Intune: - -- Cinebody by Super 6 LLC - -For more information about protected apps, see [Microsoft Intune protected apps](../apps/apps-supported-intune-apps.md). - -## Week of February 19, 2024 (Service release 2402) - -### App management - -#### More app configuration permissions for Android apps - -There are six new permissions that can be configured for an Android app using an app configuration policy. They are: - -- Allow background body sensor data -- Media Video (read) -- Media Images (read) -- Media Audio (read) -- Nearby Wifi Devices -- Nearby Devices - -For more information about how to use app config policies for Android apps, see [Add app configuration policies for managed Android Enterprise devices](../apps/app-configuration-policies-use-android.md). - -#### Newly available protected apps for Intune - -The following protected apps are now available for Microsoft Intune: - -- Bob HR by Hi Bob Ltd -- ePRINTit SaaS by ePRINTit USA LLC -- Microsoft Copilot by Microsoft Corporation - -For more information about protected apps, see [Microsoft Intune protected apps](../apps/apps-supported-intune-apps.md). - -#### Update to Intune Management Extension on Windows - -To support expanded functionality and bug fixes, use .NET Framework 4.7.2 or higher with the Intune Management Extension on Windows clients. If a Windows client continues to use an earlier version of the .NET Framework, the Intune Management Extension continues to function. The .NET Framework 4.7.2 is available from Windows Update as of July 10, 2018, which is included in Windows 10 1809 (RS5) and newer. Multiple versions of the .NET Framework can coexist on a device. - -Applies to: - -- Windows 10 -- Windows 11 - -### Device configuration - -#### Use assignment filters on Endpoint Privilege Management (EPM) policies - -You can use assignment filters to assign a policy based on rules you create. A filter allows you to narrow the assignment scope of a policy, like targeting devices with a specific OS version or a specific manufacturer. - -You can use filters on Endpoint Privilege Management (EPM) policies. - -For more information, see: - -- [Use filters when assigning your apps, policies, and profiles in Intune](filters.md) -- [List of platforms, policies, and app types supported by filters in Intune](filters-supported-workloads.md) - -Applies to: - -- Windows 10 -- Windows 11 - -#### New settings available in the Apple settings catalog - -The [Settings Catalog](../configuration/settings-catalog.md) lists all the settings you can configure in a device policy, and all in one place. - -There are new settings in the Settings Catalog. To see these settings, in the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Devices** > **Manage devices** > **Configuration** > **Create** > **New policy** > **iOS/iPadOS** or **macOS** for platform > **Settings catalog** for profile type. - -##### iOS/iPadOS - -- **Restrictions** - - - Allow Live Voicemail - - Force Classroom Unprompted Screen Observation - - Force Preserve ESIM On Erase - -##### macOS - -- **Full Disk Encryption > FileVault** > Force Enable In Setup Assistant -- **Restrictions** > Force Classroom Unprompted Screen Observation - -For more information, see: - -- [Use FileVault disk encryption for macOS with Intune](../protect/encrypt-devices-filevault.md) -- [Create a policy using settings catalog](../configuration/settings-catalog.md) - -#### Import up to 20 custom ADMX and ADML administrative templates - -You can import custom ADMX and ADML administrative templates in Microsoft Intune. Previously, you could import up to 10 files. Now, you can upload up to 20 files. - -Applies to: - -- Windows 10 -- Windows 11 - -For more information on this feature, see [Import custom ADMX and ADML administrative templates into Microsoft Intune (public preview)](../configuration/administrative-templates-import-custom.md). - -#### New setting for updating MAC address randomization on Android Enterprise devices - -There's a new **MAC address randomization** setting on Android Enterprise devices (**Devices** > **Manage devices** > **Configuration** > **Create** > **New policy** > **Android Enterprise** for platform > **Fully Managed, Dedicated, and Corporate-Owned Work Profile** > **Wi-Fi** for profile type). - -Starting with Android 10, when connecting to a network, devices present a randomized MAC address instead of the physical MAC address. Using randomized MAC addresses is recommended for privacy, as it's harder to track a device by its MAC address. However, randomized MAC addresses break functionality that relies on a static MAC address, including network access control (NAC). - -Your options: - -- **Use device default**: Intune doesn't change or update this setting. By default, when connecting to a network, devices present a randomized MAC address instead of the physical MAC address. Any updates made by the user to the setting persist. - -- **Use randomized MAC**: Enables MAC address randomization on devices. When devices connect to a new network, devices present a randomized MAC address, instead of the physical MAC address. If the user changes this value on their device, it resets to **Use randomized MAC** on the next Intune sync. - -- **Use device MAC**: Forces devices to present their actual Wi-Fi MAC address instead of a random MAC address. This setting allows devices to be tracked by their MAC address. Only use this value when necessary, such as for network access control (NAC) support. If the user changes this value on their device, it resets to **Use device MAC** on the next Intune sync. - -Applies to: - -- Android 13 and newer - -For more information on the Wi-Fi settings you can configure, see [Add Wi-Fi settings for Android Enterprise dedicated and fully managed devices in Microsoft Intune](../configuration/wi-fi-settings-android-enterprise.md). - -#### Turn Off Copilot in Windows setting in the Windows settings catalog - -The [Settings Catalog](../configuration/settings-catalog.md) lists all the settings you can configure in a device policy, and all in one place. - -There's a new setting in the Settings Catalog. To see this setting, in the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Devices** > **Manage devices** > **Configuration** > **Create** > **New policy** > **Windows** for platform > **Settings catalog** for profile type. - -- **Windows AI > Turn Off Copilot in Windows (User)** - - - If you enable this policy setting, users can't use Copilot. The Copilot icon won't appear on the taskbar. - - If you disable or don't configure this policy setting, users can use Copilot when it's available to them. - -This setting uses the [Policy CSP - WindowsAI](/windows/client-management/mdm/policy-csp-windowsai). - -For more information about configuring Settings Catalog policies in Intune, including user scope vs. device scope, see [Create a policy using settings catalog](../configuration/settings-catalog.md). - -Applies to: - -- Windows 10 and later - -#### Windows Autopilot self-deploying mode is now generally available - -Windows Autopilot self-deploying mode is now generally available and out of preview. Windows Autopilot self-deploying mode enables you to deploy Windows devices with little to no user interaction. Once the device connects to network, the device provisioning process starts automatically: the device joins Microsoft Entra ID, enrolls in Intune, and syncs all device-based configurations targeted to the device. Self-deploying mode ensures that the user can't access desktop until all device-based configuration is applied. The Enrollment Status Page (ESP) is displayed during OOBE so users can track the status of the deployment. For more information, see: - -- [Windows Autopilot self-deploying mode](/autopilot/self-deploying) -- [Step by step tutorial for Windows Autopilot self-deploying mode in Intune](/autopilot/tutorial/self-deploying/self-deploying-workflow) - -This information is also published in [Windows Autopilot: What's new](/autopilot/whats-new). - -#### Windows Autopilot for pre-provisioned deployment is now generally available - -Windows Autopilot for pre-provisioned deployment is now generally available and out of preview. Windows Autopilot for pre-provisioned deployment is used by organizations that want to ensure devices are business-ready before the user accesses them. With pre-provisioning, admins, partners, or OEMs can access a technician flow from the Out-of-box experience (OOBE) and kick off device setup. Next, the device is sent to the user who completes provisioning in the user phase. Pre-provisioning delivers most the configuration in advance so the end user can get to the desktop faster. For more information, see: - -- [Windows Autopilot for pre-provisioned deployment](/autopilot/pre-provision). -- [Step by step tutorial for Windows Autopilot for pre-provisioned deployment Microsoft Entra join in Intune](/autopilot/tutorial/pre-provisioning/azure-ad-join-workflow) -- [Step by step tutorial for Windows Autopilot for pre-provisioned deployment Microsoft Entra hybrid join in Intune](/autopilot/tutorial/pre-provisioning/hybrid-azure-ad-join-workflow). - -This information is also published in [Windows Autopilot: What's new](/autopilot/whats-new). - -### Device enrollment - -#### ESP setting to install required apps during Windows Autopilot pre-provisioning - -The setting **Only fail selected blocking apps in technician phase** is now generally available to configure in Enrollment Status Page (ESP) profiles. This setting only appears in ESP profiles that have *blocking apps* selected. - -For more information, see [Set up the Enrollment Status Page](../enrollment/windows-enrollment-status.md#create-new-profile). - -#### New local primary account configuration for macOS automated device enrollment - -Configure local primary account settings for Macs enrolling in Intune via Apple automated device enrollment. These settings, supported on devices running macOS 10.11 and later, are available in new and existing enrollment profiles under the new **Account Settings** tab. For this feature to work, the enrollment profile must be configured with user-device affinity and one of the following authentication methods: - -- Setup Assistant with modern authentication -- Setup Assistant (legacy) - -Applies to: - -- macOS 10.11 and later - -For more information about macOS account settings, see [Create an Apple enrollment profile in Intune](../enrollment/device-enrollment-program-enroll-macos.md#create-an-apple-enrollment-profile). - -#### Await final configuration for macOS automated device enrollment now generally available - -Now generally available, *await final configuration* enables a locked experience at the end of Setup Assistant to ensure that critical device configuration policies are installed on devices. The locked experience works on devices targeted with new and existing enrollment profiles, enrolling via one of these authentication methods: - -- Setup Assistant with modern authentication -- Setup Assistant (legacy) -- Without user device affinity - -Applies to: - -- macOS 10.11 and later - -For information about how to enable await final configuration, see [Create an Apple enrollment profile](../enrollment/device-enrollment-program-enroll-macos.md#create-an-apple-enrollment-profile). - -### Device management - -#### AOSP devices check for new tasks and notifications approximately every 15 minutes - -On devices enrolled with Android (AOSP) management, Intune attempts to check for new tasks and notifications approximately every 15 minutes. To use this feature, devices must be using the Intune app version 24.02.4 or newer. - -Applies to: - -- Android (AOSP) - -For more information, see: - -- [How to use Intune in environments without Google Mobile Services](../apps/manage-without-gms.md#some-tasks-can-be-delayed) -- [Policy refresh intervals in Intune](../configuration/device-profile-troubleshoot.md#policy-refresh-intervals) - -#### New device management experience for Government clouds in Microsoft Intune - -In government clouds, there's a new device management experience in the Intune admin center. The **Devices** area now has a more consistent UI, with more capable controls and an improved navigation structure so you can find what you need faster. - -If you want to try the new experience before your tenant is updated, go to **Devices** > **Overview**, select the **Preview upcoming changes to Devices and provide feedback** notification banner, and select **Try it now**. - -#### Bulk approval of drivers - -Bulk actions are now available for Windows Driver update policies. With bulk actions, multiple driver updates can be approved, paused, or declined at the same time, saving time and effort. - -When you bulk approve drivers, the date for when the drivers become available to applicable devices can also be set, enabling drivers to be installed together. - -Applies to: - -- Windows 10 -- Windows 11 - -For more information, see [Bulk driver updates](../protect/windows-driver-updates-policy.md#bulk-driver-updates). - -#### App Control for Business policy limitation is resolved - -A previously documented limitation for App Control for Business policy (WDAC), that limited the number of active policies per device to 32, is resolved by Windows. The issue involves a potential [Boot stop failure when more than 32 policies are active](/windows/security/application-security/application-control/windows-defender-application-control/operations/known-issues#boot-stop-failure-blue-screen-occurs-if-more-than-32-policies-are-active) on a device. - -This issue is resolved for devices that run Windows 10 1903 or later with a Windows security update released on or after March 12, 2024. Older versions of Windows can expect to receive this fix in future Windows security updates. - -Applies to: - -- Windows 10 version 1903 and later - -To learn more about App Control for Business policy for Intune, see [Manage approved apps for Windows devices with App Control for Business policy and Managed Installers for Microsoft Intune](../protect/endpoint-security-app-control-policy.md). - -### Tenant administration - -#### Customization pane support for excluding groups - -The Customization pane now supports selecting groups to exclude when assigning policies. You can find this setting in the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) by selecting **Tenant administration** > **Customization**. - -For more information, see [Assign policies in Microsoft Intune](../configuration/device-profile-assign.md). - -## Week of January 29, 2024 - -### Microsoft Intune Suite - -#### Microsoft Intune Enterprise Application Management - -Enterprise Application Management provides an Enterprise App Catalog of Win32 applications that are easily accessible in Intune. You can add these applications to your tenant by selecting them from the Enterprise App Catalog. When you add an Enterprise App Catalog app to your Intune tenant, default installation, requirements, and detection settings are automatically provided. You can modify these settings as well. Intune hosts Enterprise App Catalog apps in Microsoft storage. - -For more information, see: - -- [Use Intune Suite add-on capabilities](../fundamentals/intune-add-ons.md) -- [Microsoft Intune Enterprise Application Management](../apps/apps-enterprise-app-management.md) -- [Add an Enterprise App Catalog app to Microsoft Intune](../apps/apps-add-enterprise-app.md) - -#### Microsoft Intune Advanced Analytics - -Intune Advanced Analytics provides comprehensive visibility of the end-user experience in your organization and optimizes it with data driven insights. It includes near real-time data about your devices with Device query, increased visibility with custom device scopes, a battery health report and a detailed device timeline for troubleshooting device issues, and anomaly detection to help identify potential vulnerabilities or risks across your device estate. - -- **Battery health report** - - The battery health report provides visibility into the health of batteries in your organization's devices and its influence on user experience. The scores and insights in this report are aimed to help IT admins with asset management and purchase decisions that improve user experience while balancing hardware costs. - -- **Run on-demand device queries on single devices** - - Intune allows you to quickly gain on-demand information about the state of your device. When you enter a query on a selected device, Intune runs a query in real time. - - The data returned can then be used to respond to security threats, troubleshoot the device, or make business decisions. - - Applies to: - - - Windows devices - -Intune Advanced Analytics is part of the Microsoft Intune Suite. For added flexibility, this new set of capabilities, together with the existing Advanced Analytics features, is also now available as an individual add-on to Microsoft subscriptions that include Intune. - -To use Device query and battery health report in your tenant, or any of the existing Advanced Analytics capabilities, you must have a license for either: - -- The Intune Advanced Analytics add-on -- The Microsoft Intune Suite add-on - -For more information, see: - -- [Use Intune Suite add-on capabilities](../fundamentals/intune-add-ons.md) -- [Microsoft Intune Advanced Analytics](../../analytics/advanced-endpoint-analytics.md) -- [Battery health](../../analytics/battery-health.md) -- [Device query](../../analytics/device-query.md) - ## What's new archive diff --git a/memdocs/intune/protect/device-protect.md b/memdocs/intune/protect/device-protect.md index 97b6e1672de..144fc42c2ce 100644 --- a/memdocs/intune/protect/device-protect.md +++ b/memdocs/intune/protect/device-protect.md @@ -8,7 +8,7 @@ keywords: author: brenduns ms.author: brenduns manager: dougeby -ms.date: 10/05/2023 +ms.date: 08/23/2024 ms.topic: overview ms.subservice: protect ms.service: microsoft-intune @@ -37,7 +37,7 @@ Microsoft Intune can help you keep your managed devices secure and up to date wh This article highlights many of Intune's built-in capabilities and partner technologies you can integrate with Intune. As you learn more about them, you can bring several together for more comprehensive solutions on your journey towards a zero-trust environment. -From the Microsoft Intune admin center, Intune [supports managed devices](../fundamentals/supported-devices-browsers.md#intune-supported-operating-systems) that run Android, iOS/iPad, Linux, macOS, and Windows 10 and Windows 11. +From the Microsoft Intune admin center, Intune [supports managed devices](../fundamentals/supported-devices-browsers.md#intune-supported-operating-systems) that run Android, iOS/iPad, Linux, macOS, and Windows. When you use Configuration Manager to manage on-premises devices, you can extend Intune policies to those devices by configuring [tenant attach](../protect/tenant-attach-intune.md) or [co-management](../../configmgr/comanage/overview.md). @@ -59,8 +59,6 @@ Deploy Intune's *endpoint security*, *device configuration*, and *device complia Following are a few of the security settings and tasks you can manage through available policies: -- **Device encryption** – Manage [BitLocker](../protect/encrypt-devices.md) on Windows 10 devices, and [FileVault](../protect/encrypt-devices-filevault.md) on macOS. - - **Authentication methods** – Configure how your devices authenticate to your organization's resources, email, and applications. - [Use certificates for authentication](../protect/certificates-configure.md) to applications, your organization's resources, and for signing and encryption of email using S/MIME. You can also set up [derived credentials](../protect/derived-credentials.md) when your environment requires the use of smartcards. @@ -68,9 +66,9 @@ Following are a few of the security settings and tasks you can manage through av - Configure settings that help limit risk, like: - Require multi-factor-authentication (MFA) to add an extra layer of authentication for users. - Set PIN and password requirements that must be met before gaining access to resources. - - Enable [Windows Hello for Business](../protect/windows-hello.md) for Windows 10 devices. + - Enable [Windows Hello for Business](../protect/windows-hello.md) for Windows devices. -- **Virtual private networks (VPNs)** – With VPN profiles, assign VPN settings to devices so they can easily connect to your organization's network. Intune supports several [VPN connection types](../configuration/vpn-settings-configure.md#vpn-connection-types) and apps that include both built-in capabilities for some platforms and both first and third-party VPN apps for devices. +- **Device encryption** – Manage [BitLocker](../protect/encrypt-devices.md) on Windows devices, and [FileVault](../protect/encrypt-devices-filevault.md) on macOS. - **Software updates** – Manage how and when devices get software updates. The following are supported: @@ -79,19 +77,26 @@ Following are a few of the security settings and tasks you can manage through av - [Zebra LifeGuard Over-the-Air (LG OTA)](../protect/zebra-lifeguard-ota-integration.md) - Manage firmware updates for supported Zebra devices through the Intune admin center. - [iOS](../protect/software-updates-ios.md) - Manage device operating system versions, and when devices check for and install updates. - [macOS](../protect/software-updates-macos.md) - Manage software updates for macOS devices that enrolled as supervised devices. - - [Windows 10](../protect/windows-update-for-business-configure.md), you can manage the Windows Update experience for devices. You can configure when devices scan or install updates, hold a set of your managed devices at specific feature versions, and more. + - [Windows](../protect/windows-update-for-business-configure.md)- To manage the Windows Update experience for devices, you can configure when devices scan or install updates, hold a set of your managed devices at specific feature versions, and more. + +- **Security baselines** – Deploy [security baselines](../protect/security-baselines.md) to establish a core security posture on your Windows devices. Security baselines are preconfigured groups of Windows settings that come recommended by the relevant product teams. You can use baselines as provided or edit instances of them to meet your security goals for targeted groups of devices. + +- **Virtual private networks (VPNs)** – With VPN profiles, assign VPN settings to devices so they can easily connect to your organization's network. Intune supports several [VPN connection types](../configuration/vpn-settings-configure.md#vpn-connection-types) and apps that include both built-in capabilities for some platforms and both first and third-party VPN apps for devices. -- **Security baselines** – Deploy [security baselines](../protect/security-baselines.md) to establish a core security posture on your Windows 10 devices. Security baselines are preconfigured groups of Windows settings that come recommended by the relevant product teams. You can use baselines as provided or edit instances of them to meet your security goals for targeted groups of devices. +- **Windows Local Administrator Password Solution (LAPS)** - With [Windows LAPS policy](../protect/windows-laps-overview.md), you can: + - Enforce password requirements for local admin accounts + - Back up a local admin account from devices to your Active Directory (AD) or Microsoft Entra + - Schedule rotation of those account passwords to help keep them safe. ## Protect data through policies Intune-managed apps and Intune's [app protection policies](../apps/app-protection-policy.md) can help stop data leaks and keep your organization's data safe. These protections can apply to devices that are enrolled with Intune and to devices that aren't. -- **Intune-managed apps** (or *managed apps* for short), are apps that have been integrated with the [Intune App SDK](../developer/app-sdk.md) or wrapped by the [Intune App Wrapping Tool](../developer/apps-prepare-mobile-application-management.md). These apps can be managed using Intune app protection policies. To view a list of publicly available managed apps, see [Intune protected apps](../apps/apps-supported-intune-apps.md). +- **Intune-managed apps** (or *managed apps* for short), are apps that integrate the [Intune App SDK](../developer/app-sdk.md) or are wrapped by the [Intune App Wrapping Tool](../developer/apps-prepare-mobile-application-management.md). These apps can be managed using Intune app protection policies. To view a list of publicly available managed apps, see [Intune protected apps](../apps/apps-supported-intune-apps.md). Users can use managed apps to work with both your organization's data, and their own personal data. However, when app protection policies require the use of a managed app, the managed app is the only app that can be used to access your organization's data. App protection rules don't apply to a user's personal data. -- **App protection policies** are rules that ensure an organization's data remains safe or contained in a managed app. The rules identify the managed app that must be used and define what can be done with the data while the app is in use. +- **App protection policies** are rules that ensure an organization's data remains safe or contained in a managed app. The rules identify the managed app that must be used, and define what can be done with the data while the app is in use. The following are examples of protections and restrictions you can set with app protection policies and managed apps: @@ -103,7 +108,7 @@ The following are examples of protections and restrictions you can set with app From the Microsoft Intune admin center, you can run [device actions](../remote-actions/device-management.md#available-remote-actions) that help keep a selected device protected. You can run a subset of these actions as [bulk device actions](../remote-actions/bulk-device-actions.md) to affect multiple devices at the same time. And several [remote actions from Intune](../../configmgr/comanage/quickstart-remote-actions.md) can also be used with co-managed devices. -Device actions aren't policy and take effect a single time when invoked. They apply either immediately if the device is accessible on-line, or when the device next boots up or checks in with Intune. Considered these actions as supplemental to the use of policies that configure and maintain security configurations for a population of devices. +Device actions aren't policy and take effect a single time when invoked. They apply either immediately if the device is accessible on-line, or when the device next boots up or checks in with Intune. Considered these actions as supplemental to the use of policies that configure and maintain security configurations for a population of devices. Following are examples of actions you can run that help secure devices and data: @@ -111,7 +116,7 @@ Following are examples of actions you can run that help secure devices and data: - BitLocker key rotation (Windows only) - Disable Activation Lock (iOS only) -- Full or Quick scan (Windows 10 only) +- Full or Quick scan (Windows only) - Remote lock - Retire (which removes your organization's data from the device while leaving personal data intact) - Update Microsoft Defender Security Intelligence @@ -124,18 +129,18 @@ Following are examples of actions you can run that help secure devices and data: - Sync (force a device to immediately check in with Intune to find new policies or pending actions) ## Integrate with other products and partner technologies - + Intune supports integration with partner apps from both first-party and third-party sources, which expand on its built-in capabilities. You can also integrate Intune with several Microsoft technologies. ### Compliance partners -Learn about using [device compliance partners](../protect/device-compliance-partners.md) with Intune. When you manage a device with a mobile device management partner other than Intune, you can integrate that compliance data with Microsoft Entra ID. When integrated, Conditional Access policies can use the partner data along-side compliance data from Intune. +Learn about using [device compliance partners](../protect/device-compliance-partners.md) with Intune. When you manage a device with a mobile device management partner other than Intune, you can integrate that compliance data with Microsoft Entra ID. When integrated, Conditional Access policies can use the partner data alongside compliance data from Intune. ### Configuration Manager You can use many Intune policies and device actions to [protect the devices you manage with Configuration Manager](../protect/endpoint-security-manage-devices.md). To support those devices, configure [co-management](../../configmgr/comanage/overview.md) or [tenant attach](../../configmgr/tenant-attach/device-sync-actions.md). You can also [use both together](../../configmgr/comanage/faq.yml#should-i-use-co-management-or-tenant-attach-) with Intune. -- With *Co-management*, you can concurrently manage a Windows 10 device with both Configuration Manager and Intune. You install the Configuration Manager client and enroll the device to Intune. The device communicates with both services. +- With *Co-management*, you can concurrently manage a Windows device with both Configuration Manager and Intune. You install the Configuration Manager client and enroll the device to Intune. The device communicates with both services. - With *Tenant attach*, you set up synchronization between your Configuration Manager site and your Intune tenant. This synchronization provides you with a single view for all devices that you manage with Microsoft Intune. @@ -144,7 +149,7 @@ After a connection between Intune and Configuration Manager is established, devi Some of the protections you can apply include: - Deploy certificates to devices by using Intune *Simple Certificate Enrollment Protocol* (SCEP) or *private and public key pair* (PKCS) certificate profiles. -- Use compliance policy. +- Use compliance policy. - Use endpoint security policies, like *Antivirus*, *Endpoint detection and response*, and *Firewall* rules. - Apply security baselines. - Manage Windows Updates. @@ -158,7 +163,7 @@ Use threat-level data with policies for device compliance, app protection, and C With an integrated MTD app: - For [enrolled devices](../protect/mtd-device-compliance-policy-create.md): - - Use Intune to deploy and then manage the MTD app on devices. + - Use Intune to deploy and then manage the MTD app on devices. - Deploy device compliance policies that use the devices reported threat level to evaluate compliance. - Define Conditional Access policies that consider a devices threat level. - Define app protection policies to determine when to block or allow access to data, based on the threat level of the device. @@ -177,17 +182,17 @@ On its own, Microsoft Defender for Endpoint provides several security focused be - **Support for Microsoft Tunnel** - On Android devices, Microsoft Defender for Endpoint is the client application you use with [Microsoft Tunnel](../protect/microsoft-tunnel-overview.md), a VPN gateway solution for Intune. When used as the Microsoft Tunnel client app, you don't need a subscription for Microsoft Defender for Endpoint. - **Security tasks** – With [security tasks](../protect/atp-manage-vulnerabilities.md), Intune admins can take advantage of Microsoft Defender for Endpoint's [threat and vulnerability management](/windows/security/threat-protection/windows-defender-atp/next-gen-threat-and-vuln-mgt) capabilities. How it works: - + - Your Defender for Endpoint team identifies at-risk-devices and create the security tasks for Intune in the Defender for Endpoint security center. - - Those tasks show up in Intune with mitigation advice that Intune admins can use to mitigate the risk. + - Those tasks show up in Intune with mitigation advice that Intune admins can use to mitigate the risk. - When a task is resolved in Intune, that status passes back to the Defender for Endpoint security center where the results of the mitigation can be evaluated. - **Endpoint security policies** – The following Intune endpoint security policies require integration with Microsoft Defender for Endpoint. When you use [tenant attach](../protect/tenant-attach-intune.md), you can deploy these policies to devices you manage with either Intune or Configuration Manager. - - [Antivirus policy](../protect/endpoint-security-antivirus-policy.md) - Manage the settings for *Microsoft Defender Antivirus* and the *Windows Security experience* on supported devices, like Windows 10 and macOS. + - [Antivirus policy](../protect/endpoint-security-antivirus-policy.md) - Manage the settings for *Microsoft Defender Antivirus* and the *Windows Security experience* on supported devices, like Windows and macOS. - [Endpoint detection and response policy](../protect/endpoint-security-edr-policy.md) – Use this policy to configure endpoint detection and response (EDR), which is a capability of Microsoft Defender for Endpoint. - + ### Conditional Access Conditional Access is a Microsoft Entra capability that [works with Intune](../protect/conditional-access.md) to help protect devices. For devices that register with Microsoft Entra ID, Conditional Access policies can use device and compliance details from Intune to enforce access decisions for users and devices. @@ -220,4 +225,4 @@ For more information, see [Endpoint Privilege Management](../protect/epm-overvie ## Next steps -Plan to use Intune's capabilities to support your journey towards a zero-trust environment by protecting your data and securing devices. Beyond the previous in-line links to learn more about those capabilities, learn about [data security and sharing in Intune](../protect/privacy-data-secure-share.md). +Plan to use Intune's capabilities to support your journey towards a zero-trust environment by protecting your data and securing devices. Beyond the previous in-line links to learn more about those capabilities, learn about [data security and sharing in Intune](../protect/privacy-data-secure-share.md). diff --git a/memdocs/intune/protect/trellix-mobile-threat-defense-connector.md b/memdocs/intune/protect/trellix-mobile-threat-defense-connector.md index 9f2f4284fbf..f4cf2248900 100644 --- a/memdocs/intune/protect/trellix-mobile-threat-defense-connector.md +++ b/memdocs/intune/protect/trellix-mobile-threat-defense-connector.md @@ -8,7 +8,7 @@ keywords: author: brenduns ms.author: brenduns manager: dougeby -ms.date: 10/18/2023 +ms.date: 08/23/2024 ms.topic: how-to ms.service: microsoft-intune ms.subservice: protect diff --git a/memdocs/intune/protect/trellix-mtd-connector-integration.md b/memdocs/intune/protect/trellix-mtd-connector-integration.md index b1e33572b89..f30f57b5bfd 100644 --- a/memdocs/intune/protect/trellix-mtd-connector-integration.md +++ b/memdocs/intune/protect/trellix-mtd-connector-integration.md @@ -8,7 +8,7 @@ keywords: author: brenduns ms.author: brenduns manager: dougeby -ms.date: 10/18/2023 +ms.date: 08/23/2024 ms.topic: how-to ms.service: microsoft-intune ms.subservice: protect diff --git a/windows-365/media/partners/nable.png b/windows-365/media/partners/nable.png new file mode 100644 index 00000000000..2570add30d7 Binary files /dev/null and b/windows-365/media/partners/nable.png differ diff --git a/windows-365/partners.md b/windows-365/partners.md index 2d120d7ea9e..1cf27250043 100644 --- a/windows-365/partners.md +++ b/windows-365/partners.md @@ -7,7 +7,7 @@ keywords: author: ErikjeMS ms.author: erikje manager: dougeby -ms.date: 06/16/2023 +ms.date: 08/22/2024 ms.topic: overview ms.service: windows-365 ms.subservice: @@ -71,6 +71,19 @@ Secure access to Windows 365 is further enhanced with IGEL OS: For more information, visit the [IGEL website](https://www.igel.com/windows365/). +## N-able + +![N-able image](./media/partners/nable.png) + +The N-able Cloud Commander is a multi-tenant solution for Microsoft's cloud. In a single console, it enables MSPs and CSPs to manage, secure, standardize, and automate: + +- Microsoft 365 users +- Azure resource +- Intune devices +- Windows 365 Business/Enterprise/Frontline Cloud PCs + +For more information, visit the [N-able website](https://www.n-able.com/products/cloud-commander). + ## Nerdio ![Nerdio image](./media/partners/nerdio.png)