mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-13 22:07:22 +00:00
Merge branch 'main' into WDAC-Docs
This commit is contained in:
commit
e7f1d63bf3
@ -112,7 +112,9 @@ If you're using Microsoft Intune to manage your devices, follow these steps to d
|
||||
1. Under *App type*, select **Microsoft Store app (new)** and choose **Select**
|
||||
1. Select **Search the Microsoft Store app (new)** and search for **Minecraft Education**
|
||||
1. Select the app and choose **Select**
|
||||
1. On the *App information* screen, select **Next**
|
||||
1. On the *App information* screen, select the *install behavior*, then select **Next**
|
||||
- *System* means install for all users (recommended for most scenarios)
|
||||
- *User* means only install for the targeted user or current user of a device
|
||||
1. On the *Assignments* screen, choose how you want to target the installation of Minecraft Education
|
||||
- *Required* means that Intune installs the app without user interaction
|
||||
- *Available* enables Minecraft Education in the Company Portal, where users can install the app on-demand
|
||||
|
@ -259,10 +259,8 @@ This sample demonstrates that both UWP and Win32 apps can be configured to autom
|
||||
xmlns:v4="http://schemas.microsoft.com/AssignedAccess/2021/config"
|
||||
>
|
||||
<Profiles>
|
||||
<Profile Id="{AFF9DA33-AE89-4039-B646-3A5706E92957}">
|
||||
<KioskModeApp v4:ClassicAppPath="%ProgramFiles(x86)%\Microsoft\Edge\Application\msedge.exe"
|
||||
<KioskModeApp v4:ClassicAppPath="%ProgramFiles(x86)%\Microsoft\Edge\Application\msedge.exe"
|
||||
v4:ClassicAppArguments="--no-first-run --kiosk-idle-timeout-minutes=5 --kiosk www.bing.com"/>
|
||||
<Profile Id="{AFF9DA33-AE89-4039-B646-3A5706E92957}">
|
||||
<KioskModeApp v4:ClassicAppPath="%ProgramFiles(x86)%\Microsoft\Edge\Application\msedge.exe" v4:ClassicAppArguments="--no-first-run --kiosk-idle-timeout-minutes=5 --kiosk www.bing.com" />
|
||||
<v4:BreakoutSequence Key="Ctrl+A"/>
|
||||
</Profile>
|
||||
</Profiles>
|
||||
|
@ -37,7 +37,7 @@ Windows Autopatch deploys, manages and maintains all configurations related to t
|
||||
The **Tenant management** blade can be found by navigating to Tenant administration > Windows Autopatch > **Tenant management**.
|
||||
|
||||
> [!IMPORTANT]
|
||||
> Starting October 12, 2022, Windows Autopatch will manage your tenant with our [first party enterprise applications](../references/windows-autopatch-changes-to-tenant.md#windows-autopatch-enterprise-applications). If your tenant is still using the [Windows Autopatch service accounts](../overview/windows-autopatch-privacy.md#service-accounts), your Global admin must take action in the new Windows Autopatch Tenant management blade to approve the configuration change. To take action or see if you need to take action, visit the Tenant management blade in the Windows Autopatch portal.
|
||||
> Starting October 12, 2022, Windows Autopatch will manage your tenant with our [enterprise applications](../references/windows-autopatch-changes-to-tenant.md#windows-autopatch-enterprise-applications). If your tenant is still using the [Windows Autopatch service accounts](../overview/windows-autopatch-privacy.md#service-accounts), your Global admin must go to the Tenant management blade to approve the configuration change.
|
||||
|
||||
The type of banner that appears depends on the severity of the action. Currently, only critical actions are listed.
|
||||
|
||||
|
@ -68,11 +68,7 @@ For more information about how Windows diagnostic data is used, see:
|
||||
|
||||
## Tenant access
|
||||
|
||||
Windows Autopatch creates an enterprise application in your tenant. This enterprise application is used to run the Windows Autopatch service.
|
||||
|
||||
| Enterprise application name | Usage | Permissions |
|
||||
| ----- | ----- | ----- |
|
||||
| Modern Workplace Management | The Modern Workplace Management application:<ul><li>Manages the service</li><li>Publishes baseline configuration updates</li><li>Maintains overall service health</li></ul> | <ul><li>DeviceManagementApps.ReadWrite.All</li><li>DeviceManagementConfiguration.ReadWrite.All</li><li>DeviceManagementManagedDevices.PriviligedOperation.All</li><li>DeviceManagementManagedDevices.ReadWrite.All</li><li>DeviceManagementRBAC.ReadWrite.All</li><li>DeviceManagementServiceConfig.ReadWrite.All</li><li>Directory.Read.All</li><li>Group.Create</li><li>Policy.Read.All</li><li>WindowsUpdates.ReadWrite.All</li></ul>|
|
||||
For more information about tenant access and changes made to your tenant upon enrolling into Windows Autopatch, see [Changes made at tenant enrollment](../references/windows-autopatch-changes-to-tenant.md).
|
||||
|
||||
### Service accounts
|
||||
|
||||
|
@ -77,4 +77,4 @@ Before moving to the next section, ensure the following steps are complete:
|
||||
> - Update group memberships for the AD FS service account
|
||||
|
||||
> [!div class="nextstepaction"]
|
||||
> [Next: configure policy settings >](/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-provision)
|
||||
> [Next: configure policy settings >](/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-provision)
|
||||
|
Loading…
x
Reference in New Issue
Block a user