mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-13 22:07:22 +00:00
Merge branch 'main' into vp-csp-auto3
This commit is contained in:
commit
3f89039f5f
@ -107,7 +107,7 @@ The following applications can also run on Windows 11 SE, and can be deployed us
|
||||
| `Free NaturalReader` | 16.1.2 | Win32 | `Natural Soft` |
|
||||
| `Ghotit Real Writer & Reader` | 10.14.2.3 | Win32 | `Ghotit Ltd` |
|
||||
| `GoGuardian` | 1.4.4 | Win32 | `GoGuardian` |
|
||||
| `Google Chrome` | 109.0.5414.75 | Win32 | `Google` |
|
||||
| `Google Chrome` | 110.0.5481.178 | Win32 | `Google` |
|
||||
| `GuideConnect` | 1.23 | Win32 | `Dolphin Computer Access` |
|
||||
| `Illuminate Lockdown Browser` | 2.0.5 | Win32 | `Illuminate Education` |
|
||||
| `Immunet` | 7.5.8.21178 | Win32 | `Immunet` |
|
||||
|
@ -139,7 +139,7 @@ For more information, see [Device registration overview](../deploy/windows-autop
|
||||
|
||||
## Steps to register devices
|
||||
|
||||
Any device (either physical or virtual) that contains an Azure AD device ID, can be added into the **Windows Autopatch Device Registration** Azure AD group through either direct membership or by being part of another Azure AD group (either dynamic or assigned) that's nested to this group, so it can be registered with Windows Autopatch. The only exception is new Windows 365 Cloud PCs, as these virtual devices must be registered with Windows Autopatch from the Windows 365 provisioning policy. For more information, see [Windows Autopatch on Windows 365 Enterprise Workloads](#windows-autopatch-on-windows-365-enterprise-workloads).
|
||||
Any device (either physical or virtual) that contains an Azure AD device ID, can be added into the **Windows Autopatch Device Registration** Azure AD group through either direct membership or by being part of another Azure AD group (either dynamic or assigned) that's nested to this group, so it can be registered with Windows Autopatch. The only exception is new Windows 365 Cloud PCs, as these virtual devices should be registered with Windows Autopatch from the Windows 365 provisioning policy. For more information, see [Windows Autopatch on Windows 365 Enterprise Workloads](#windows-autopatch-on-windows-365-enterprise-workloads).
|
||||
Since existing Windows 365 Cloud PCs already have an existing Azure AD device ID, these devices can be added into the **Windows Autopatch Device Registration** Azure group through either direct membership or by being part of another Azure AD group (either dynamic or assigned) that's nested to this group.
|
||||
|
||||
**To register devices with Windows Autopatch:**
|
||||
|
@ -91,7 +91,7 @@ However, the device may still be eligible for other managed updates. For more in
|
||||
|
||||
## Allow or block Microsoft 365 App updates
|
||||
|
||||
For organizations seeking greater control, you can allow or block Microsoft 365 App updates for Windows Autopatch-enrolled devices. When the Microsoft 365 App update setting is set to **Block**, Windows Autopatch won't provide Microsoft 365 App updates on your behalf, and your organizations will have full control over these updates. You can choose to receive updates from [channels](/deployoffice/overview-update-channels) other than the default [Monthly Enterprise Channel](/deployoffice/overview-update-channels#monthly-enterprise-channel-overview).
|
||||
For organizations seeking greater control, you can allow or block Microsoft 365 App updates for Windows Autopatch-enrolled devices. When the Microsoft 365 App update setting is set to **Block**, Windows Autopatch won't provide Microsoft 365 App updates on your behalf, and your organizations will have full control over these updates. For example, you can continue to receive updates from [channels](/deployoffice/overview-update-channels) other than the default [Monthly Enterprise Channel](/deployoffice/overview-update-channels#monthly-enterprise-channel-overview).
|
||||
|
||||
**To allow or block Microsoft 365 App updates:**
|
||||
|
||||
|
@ -91,8 +91,10 @@ landingContent:
|
||||
links:
|
||||
- text: Using signed policies to protect against tampering
|
||||
url: use-signed-policies-to-protect-windows-defender-application-control-against-tampering.md
|
||||
- text: Audit and enforce policies
|
||||
url: audit-and-enforce-windows-defender-application-control-policies.md
|
||||
- text: Audit mode policies
|
||||
url: audit-windows-defender-application-control-policies.md
|
||||
- text: Enforcement mode policies
|
||||
url: enforce-windows-defender-application-control-policies.md
|
||||
- text: Disabling WDAC policies
|
||||
url: disable-windows-defender-application-control-policies.md
|
||||
- linkListType: tutorial
|
||||
|
Loading…
x
Reference in New Issue
Block a user