mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 13:27:23 +00:00
Update windows/client-management/mdm/policy-csp-networklistmanager.md
Co-authored-by: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>
This commit is contained in:
parent
dff2610703
commit
c798567889
@ -64,7 +64,7 @@ When entering a list of TLS endpoints in Microsoft Endpoint Manager, you should
|
|||||||
```<![CDATA[https://nls.corp.contoso.comhttps://nls.corp.fabricam.com]]>```
|
```<![CDATA[https://nls.corp.contoso.comhttps://nls.corp.fabricam.com]]>```
|
||||||
- The HTTPS endpoint must not have any additional authentication checks, such as login or multifactor authentication.
|
- The HTTPS endpoint must not have any additional authentication checks, such as login or multifactor authentication.
|
||||||
- The HTTPS endpoint must be an internal address not accessible from outside the corporate network.
|
- The HTTPS endpoint must be an internal address not accessible from outside the corporate network.
|
||||||
- The client must trust the server certificate, so the CA cert the HTTPS server cert chains to must be present in the client machines root certificate store.
|
- The client must trust the server certificate, so the CA certificate that the HTTPS server certificate chains to must be present in the client machine's root certificate store.
|
||||||
- A certificate should not be a public certificate.
|
- A certificate should not be a public certificate.
|
||||||
|
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user