From 0bcdd3ff76833327e97e5d2dcbc9d3d589ffe931 Mon Sep 17 00:00:00 2001
From: junhasems <65909470+junhasems@users.noreply.github.com>
Date: Wed, 15 Mar 2023 21:04:49 +0900
Subject: [PATCH 1/5] hello-hybrid-cert-whfb-settings-adfs.md
Fix hyperlink from "hello-hybrid-key-trust-provision" to "hello-hybrid-cert-whfb-provision"
---
.../hello-for-business/hello-hybrid-cert-whfb-settings-adfs.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-adfs.md b/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-adfs.md
index 9d45b8bed7..ca0662ddde 100644
--- a/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-adfs.md
+++ b/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-settings-adfs.md
@@ -77,4 +77,4 @@ Before moving to the next section, ensure the following steps are complete:
> - Update group memberships for the AD FS service account
> [!div class="nextstepaction"]
-> [Next: configure policy settings >](/windows/security/identity-protection/hello-for-business/hello-hybrid-key-trust-provision)
\ No newline at end of file
+> [Next: configure policy settings >](/windows/security/identity-protection/hello-for-business/hello-hybrid-cert-whfb-provision)
From 1a06ffe36823792fc5502b703d98ea2a421616a3 Mon Sep 17 00:00:00 2001
From: Sriraman M S <45987684+msbemba@users.noreply.github.com>
Date: Wed, 15 Mar 2023 20:51:10 +0530
Subject: [PATCH 2/5] Update kiosk-xml.md
Made changes to the XML
Fixes#https://github.com/MicrosoftDocs/windows-itpro-docs/issues/11352
---
windows/configuration/kiosk-xml.md | 6 ++----
1 file changed, 2 insertions(+), 4 deletions(-)
diff --git a/windows/configuration/kiosk-xml.md b/windows/configuration/kiosk-xml.md
index 2229eb5af7..d4525a15f4 100644
--- a/windows/configuration/kiosk-xml.md
+++ b/windows/configuration/kiosk-xml.md
@@ -259,10 +259,8 @@ This sample demonstrates that both UWP and Win32 apps can be configured to autom
xmlns:v4="http://schemas.microsoft.com/AssignedAccess/2021/config"
>
-
-
+
+
From 1e18578c7102baa0cf5f0c4755403e874e98c81c Mon Sep 17 00:00:00 2001
From: Scott Breen <39719539+scottbreenmsft@users.noreply.github.com>
Date: Thu, 16 Mar 2023 11:50:11 +1000
Subject: [PATCH 3/5] Update get-minecraft-for-education.md
Updating article to recommend using the system install behavior now that it has been released. Intune What's new docs planned to be updated tomorrow referencing the system context support.
---
education/windows/get-minecraft-for-education.md | 4 +++-
1 file changed, 3 insertions(+), 1 deletion(-)
diff --git a/education/windows/get-minecraft-for-education.md b/education/windows/get-minecraft-for-education.md
index 0c1e50cd52..bd0cb591bf 100644
--- a/education/windows/get-minecraft-for-education.md
+++ b/education/windows/get-minecraft-for-education.md
@@ -112,7 +112,9 @@ If you're using Microsoft Intune to manage your devices, follow these steps to d
1. Under *App type*, select **Microsoft Store app (new)** and choose **Select**
1. Select **Search the Microsoft Store app (new)** and search for **Minecraft Education**
1. Select the app and choose **Select**
-1. On the *App information* screen, select **Next**
+1. On the *App information* screen, select the *install behavior*, then select **Next**
+ - *System* means install for all users (recommended for most scenarios)
+ - *User* means only install for the targeted user or current user of a device
1. On the *Assignments* screen, choose how you want to target the installation of Minecraft Education
- *Required* means that Intune installs the app without user interaction
- *Available* enables Minecraft Education in the Company Portal, where users can install the app on-demand
From 213a8e179e32ed7b2c2b1c1f4c8af7636ea73bbe Mon Sep 17 00:00:00 2001
From: tiaraquan
Date: Thu, 16 Mar 2023 11:17:19 -0700
Subject: [PATCH 4/5] Consolidating tenant access and enterprise application
information
---
.../windows-autopatch/overview/windows-autopatch-privacy.md | 6 +-----
1 file changed, 1 insertion(+), 5 deletions(-)
diff --git a/windows/deployment/windows-autopatch/overview/windows-autopatch-privacy.md b/windows/deployment/windows-autopatch/overview/windows-autopatch-privacy.md
index 46198efe32..a04a060c4c 100644
--- a/windows/deployment/windows-autopatch/overview/windows-autopatch-privacy.md
+++ b/windows/deployment/windows-autopatch/overview/windows-autopatch-privacy.md
@@ -68,11 +68,7 @@ For more information about how Windows diagnostic data is used, see:
## Tenant access
-Windows Autopatch creates an enterprise application in your tenant. This enterprise application is used to run the Windows Autopatch service.
-
-| Enterprise application name | Usage | Permissions |
-| ----- | ----- | ----- |
-| Modern Workplace Management | The Modern Workplace Management application:- Manages the service
- Publishes baseline configuration updates
- Maintains overall service health
| - DeviceManagementApps.ReadWrite.All
- DeviceManagementConfiguration.ReadWrite.All
- DeviceManagementManagedDevices.PriviligedOperation.All
- DeviceManagementManagedDevices.ReadWrite.All
- DeviceManagementRBAC.ReadWrite.All
- DeviceManagementServiceConfig.ReadWrite.All
- Directory.Read.All
- Group.Create
- Policy.Read.All
- WindowsUpdates.ReadWrite.All
|
+For more information about tenant access and changes made to your tenant upon enrolling into Windows Autopatch, see [Changes made at tenant enrollment](../references/windows-autopatch-changes-to-tenant.md).
### Service accounts
From a6d75e8261a4b1c42f0e35c272521513bc6edf43 Mon Sep 17 00:00:00 2001
From: tiaraquan
Date: Thu, 16 Mar 2023 11:38:50 -0700
Subject: [PATCH 5/5] Removed redundancy
---
.../operate/windows-autopatch-maintain-environment.md | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/windows/deployment/windows-autopatch/operate/windows-autopatch-maintain-environment.md b/windows/deployment/windows-autopatch/operate/windows-autopatch-maintain-environment.md
index b67ec6d208..8ac2a90c62 100644
--- a/windows/deployment/windows-autopatch/operate/windows-autopatch-maintain-environment.md
+++ b/windows/deployment/windows-autopatch/operate/windows-autopatch-maintain-environment.md
@@ -37,7 +37,7 @@ Windows Autopatch deploys, manages and maintains all configurations related to t
The **Tenant management** blade can be found by navigating to Tenant administration > Windows Autopatch > **Tenant management**.
> [!IMPORTANT]
-> Starting October 12, 2022, Windows Autopatch will manage your tenant with our [first party enterprise applications](../references/windows-autopatch-changes-to-tenant.md#windows-autopatch-enterprise-applications). If your tenant is still using the [Windows Autopatch service accounts](../overview/windows-autopatch-privacy.md#service-accounts), your Global admin must take action in the new Windows Autopatch Tenant management blade to approve the configuration change. To take action or see if you need to take action, visit the Tenant management blade in the Windows Autopatch portal.
+> Starting October 12, 2022, Windows Autopatch will manage your tenant with our [enterprise applications](../references/windows-autopatch-changes-to-tenant.md#windows-autopatch-enterprise-applications). If your tenant is still using the [Windows Autopatch service accounts](../overview/windows-autopatch-privacy.md#service-accounts), your Global admin must go to the Tenant management blade to approve the configuration change.
The type of banner that appears depends on the severity of the action. Currently, only critical actions are listed.