diff --git a/windows/deployment/windows-autopatch/deploy/windows-autopatch-register-devices.md b/windows/deployment/windows-autopatch/deploy/windows-autopatch-register-devices.md index f0938f7fd7..5836f3979a 100644 --- a/windows/deployment/windows-autopatch/deploy/windows-autopatch-register-devices.md +++ b/windows/deployment/windows-autopatch/deploy/windows-autopatch-register-devices.md @@ -1,7 +1,7 @@ --- title: Register your devices description: This article details how to register devices in Autopatch. -ms.date: 02/15/2024 +ms.date: 07/10/2024 ms.service: windows-client ms.subservice: itpro-updates ms.topic: how-to @@ -112,10 +112,7 @@ The following are the possible device readiness statuses in Windows Autopatch: ## Built-in roles required for device registration -A role defines the set of permissions granted to users assigned to that role. You can use one of the following built-in roles in Windows Autopatch to register devices: - -- Microsoft Entra Global Administrator -- Intune Service Administrator +A role defines the set of permissions granted to users assigned to that role. You can use the **Intune Service Administrator** role to register devices. For more information, see [Microsoft Entra built-in roles](/azure/active-directory/roles/permissions-reference) and [Role-based access control (RBAC) with Microsoft Intune](/mem/intune/fundamentals/role-based-access-control). diff --git a/windows/deployment/windows-autopatch/operate/windows-autopatch-policy-health-and-remediation.md b/windows/deployment/windows-autopatch/operate/windows-autopatch-policy-health-and-remediation.md index d0371e0e59..54d541524e 100644 --- a/windows/deployment/windows-autopatch/operate/windows-autopatch-policy-health-and-remediation.md +++ b/windows/deployment/windows-autopatch/operate/windows-autopatch-policy-health-and-remediation.md @@ -1,7 +1,7 @@ --- title: policy health and remediation description: Describes what Autopatch does it detects policies in the tenant are either missing or modified to states that affect the service -ms.date: 07/08/2024 +ms.date: 07/10/2024 ms.service: windows-client ms.subservice: itpro-updates ms.topic: how-to @@ -44,7 +44,7 @@ Alerts are raised when deployment rings don't have the required policies and the ## Built-in roles required for remediation actions -The minimum role required to restore configurations is **Intune Service Administrator**. You can also perform these actions in the Global administrator role. +The minimum role required to restore configurations is **Intune Service Administrator**. ## Restore device configuration policy diff --git a/windows/deployment/windows-autopatch/operate/windows-autopatch-windows-quality-and-feature-update-reports-overview.md b/windows/deployment/windows-autopatch/operate/windows-autopatch-windows-quality-and-feature-update-reports-overview.md index 9d5cd07373..c556fca641 100644 --- a/windows/deployment/windows-autopatch/operate/windows-autopatch-windows-quality-and-feature-update-reports-overview.md +++ b/windows/deployment/windows-autopatch/operate/windows-autopatch-windows-quality-and-feature-update-reports-overview.md @@ -1,7 +1,7 @@ --- title: Windows quality and feature update reports overview description: This article details the types of reports available and info about update device eligibility, device update health, device update trends in Windows Autopatch. -ms.date: 04/09/2024 +ms.date: 07/10/2024 ms.service: windows-client ms.subservice: itpro-updates ms.topic: conceptual @@ -53,7 +53,6 @@ The Windows feature update report types are organized into the following focus a Users with the following permissions can access the reports: -- Global Administrator - Intune Service Administrator - Global Reader - Services Support Administrator