Merge pull request #11387 from msarcletti/patch-9

Update policy-csp-networklistmanager.md
This commit is contained in:
Vinay Pamnani
2023-03-08 14:33:33 -05:00
committed by GitHub

View File

@ -42,18 +42,19 @@ List of URLs (seperated by Unicode character 0xF000) to endpoints accessible onl
<!-- AllowedTlsAuthenticationEndpoints-Editable-Begin -->
<!-- Add any additional information about this policy here. Anything outside this section will get overwritten. -->
When entering a list of TLS endpoints in Microsoft Intune, use the following format, even in the UI:
`<![CDATA[https://nls.corp.contoso.com&#xF000;https://nls.corp.fabricam.com]]>`
- When entering a list of TLS endpoints in Microsoft Intune using a configuration profile with a custom template and the OMA URI, use the following format: `<![CDATA[https://nls.corp.contoso.com&#xF000;https://nls.corp.fabricam.com]]>`
- The HTTPS endpoint must not have any more authentication checks, such as sign-in or multi-factor authentication.
- The HTTPS endpoint must be an internal address not accessible from outside the organizational network.
- The client must trust the server certificate. So the CA certificate that the HTTPS server certificate chains to must be present in the client machine's root certificate store.
- A certificate shouldn't be a public certificate.
To test the URL, use a PowerShell command similar to below:
```powershell
Invoke-WebRequest -Uri https://nls.corp.contoso.com -Method get -UseBasicParsing -MaximumRedirection 0
```
`StatusCode` return by the command must be 200 (`HTTP_STATUS_OK`).
<!-- AllowedTlsAuthenticationEndpoints-Editable-End -->
<!-- AllowedTlsAuthenticationEndpoints-DFProperties-Begin -->