mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-14 14:27:22 +00:00
Merge pull request #7420 from MicrosoftDocs/main
Publish main to live on 11/2 @ 10:30 am
This commit is contained in:
commit
e93460272a
@ -41,7 +41,7 @@ Each method accomplishes essentially the same task, but some methods may be bett
|
||||
|
||||
To add a locally installed application to a package or to a connection group’s virtual environment, you add a subkey to the `RunVirtual` registry key in the Registry Editor, as described in the following sections.
|
||||
|
||||
There's no Group Policy setting available to manage this registry key, so you have to use Microsoft Endpoint Manager or another electronic software distribution (ESD) system, or manually edit the registry.
|
||||
There's no Group Policy setting available to manage this registry key. So, you have to use Microsoft Intune or Configuration Manager, another electronic software distribution (ESD) system, or manually edit the registry.
|
||||
|
||||
Starting with App-V 5.0 SP3, when using RunVirtual, you can publish packages globally or to the user.
|
||||
|
||||
@ -65,7 +65,7 @@ Starting with App-V 5.0 SP3, when using RunVirtual, you can publish packages glo
|
||||
Use the `HKEY_LOCAL_MACHINE` or `HKEY_CURRENT_USER` key. But, all of the following conditions must be fulfilled:
|
||||
|
||||
- If you want to include multiple packages in the virtual environment, you must include them in an enabled connection group.
|
||||
- Create only one subkey for one of the packages in the connection group. If, for example, you have one package that is published globally, and another package that is published to the user, you create a subkey for either of these packages, but not both. Although you create a subkey for only one of the packages, all of the packages in the connection group, plus the local application, will be available in the virtual environment.
|
||||
- Create only one subkey for one of the packages in the connection group. For example, you have one package that is published globally and another package that is published to the user. You create a subkey for either of these packages, but not both. Although you create a subkey for only one of the packages, all of the packages in the connection group, plus the local application, will be available in the virtual environment.
|
||||
- The key under which you create the subkey must match the publishing method you used for the package.
|
||||
|
||||
For example, if you published the package to the user, you must create the subkey under `HKEY_CURRENT_USER\SOFTWARE\Microsoft\AppV\Client\RunVirtual`. Don't add a key for the same application under both hives.
|
||||
|
@ -20,11 +20,11 @@ ms.technology: itpro-apps
|
||||
|
||||
## Before you begin
|
||||
|
||||
As organizations become more global, and to support employees working from anywhere, it's recommended to use a Mobile Device Management (MDM) provider. MDM providers help manage your devices, and help manage apps on your devices. For Microsoft, that includes using Microsoft Endpoint Manager. Endpoint Manager includes Microsoft Intune, which is a cloud service, and Configuration Manager, which is on-premises.
|
||||
As organizations become more global, and to support employees working from anywhere, it's recommended to use a Mobile Device Management (MDM) provider. MDM providers help manage your devices, and help manage apps on your devices. You can use the Microsoft Intune family of products. This family includes Microsoft Intune, which is a cloud service, and Configuration Manager, which is on-premises.
|
||||
|
||||
In this article, we mention these services. If you're not managing your devices using an MDM provider, the following resources may help you get started:
|
||||
|
||||
- [Microsoft Endpoint Manager overview](/mem/endpoint-manager-overview)
|
||||
- [Endpoint Management at Microsoft](/mem/endpoint-manager-overview)
|
||||
- [What is Microsoft Intune](/mem/intune/fundamentals/what-is-intune) and [Microsoft Intune planning guide](/mem/intune/fundamentals/intune-planning-guide)
|
||||
- [What is Configuration Manager?](/mem/configmgr/core/understand/introduction)
|
||||
|
||||
@ -32,7 +32,7 @@ In this article, we mention these services. If you're not managing your devices
|
||||
|
||||
There are different types of apps that can run on your Windows client devices. This section lists some of the common apps used on Windows devices.
|
||||
|
||||
- **Microsoft 365 apps**: These apps are used for business and productivity, and include Outlook, Word, Teams, OneNote, and more. Depending on the licenses your organization has, you may already have these apps. Using an MDM provider, these apps can also be deployed to mobile devices, including smartphones.
|
||||
- **Microsoft 365 apps**: These apps are used for business and productivity, and include Outlook, Word, Teams, OneNote, and more. Depending on the licenses your organization has, you may already have these apps. When you use an MDM provider, these apps can also be deployed to mobile devices, including smartphones.
|
||||
|
||||
For more information on the Microsoft 365 license options, and what you get, see [Transform your enterprise with Microsoft 365](https://www.microsoft.com/microsoft-365/compare-microsoft-365-enterprise-plans).
|
||||
|
||||
@ -95,7 +95,7 @@ When your apps are ready, you can add or deploy these apps to your Windows devic
|
||||
- [Add apps to Microsoft Intune](/mem/intune/apps/apps-add)
|
||||
- [Application management in Configuration Manager](/mem/configmgr/apps/understand/introduction-to-application-management)
|
||||
|
||||
- **Microsoft Store**: Using the Microsoft Store app, Windows users can download apps from the public store. And, they can download apps provided by your organization, which is called the "private store". If your organization creates its own apps, you can use **[Windows Package Manager](/windows/package-manager)** to add apps to the private store.
|
||||
- **Microsoft Store**: When you use the Microsoft Store app, Windows users can download apps from the public store. And, they can download apps provided by your organization, which is called the "private store". If your organization creates its own apps, you can use **[Windows Package Manager](/windows/package-manager)** to add apps to the private store.
|
||||
|
||||
To help manage the Microsoft Store on your devices, you can use policies:
|
||||
|
||||
|
@ -26,11 +26,11 @@ This article discusses the Company Portal app installation options, adding organ
|
||||
|
||||
## Before you begin
|
||||
|
||||
The Company Portal app is included with Microsoft Endpoint Manager. Endpoint Manager is a Mobile Device Management (MDM) and Mobile Application manager (MAM) provider. It help manages your devices, and manage apps on your devices.
|
||||
The Company Portal app is included with Microsoft Intune. Intune is a Mobile Device Management (MDM) and Mobile Application manager (MAM) provider. It helps manage your devices, your identities, and app data on your devices.
|
||||
|
||||
If you're not managing your devices using an MDM provider, the following resources may help you get started:
|
||||
|
||||
- [Microsoft Endpoint Manager overview](/mem/endpoint-manager-overview)
|
||||
- [Endpoint Management at Microsoft](/mem/endpoint-manager-overview)
|
||||
- [What is Microsoft Intune](/mem/intune/fundamentals/what-is-intune) and [Microsoft Intune planning guide](/mem/intune/fundamentals/intune-planning-guide)
|
||||
- [What is Configuration Manager?](/mem/configmgr/core/understand/introduction)
|
||||
|
||||
@ -45,7 +45,7 @@ To use the Company Portal app:
|
||||
|
||||
To install the Company Portal app, you have some options:
|
||||
|
||||
- **Use Microsoft Endpoint Manager**: Endpoint Manager includes Microsoft Intune (cloud) and Configuration Manager (on-premises). With both services, you can add Microsoft Store apps, like the Company Portal app. Once added, you create an app policy that deploys and installs the Company Portal app to your devices.
|
||||
- **Use Microsoft Intune**: Microsoft Intune is a family or products that include Microsoft Intune (cloud) and Configuration Manager (on-premises). With both services, you can add Microsoft Store apps, like the Company Portal app. Once added, you create an app policy that deploys and installs the Company Portal app to your devices.
|
||||
|
||||
- This option is preferred, and is the most scalable, especially if you have many devices. When you create the app policy, the policy can be deployed to many users and many devices simultaneously. Admins can also use reporting to make sure the app is installed on organization-managed devices.
|
||||
|
||||
@ -55,7 +55,7 @@ To install the Company Portal app, you have some options:
|
||||
|
||||
For more information, see:
|
||||
|
||||
- [What is Microsoft Endpoint Manager](/mem/endpoint-manager-overview)
|
||||
- [Endpoint Management at Microsoft](/mem/endpoint-manager-overview)
|
||||
- [Add Microsoft Store apps to Microsoft Intune](/mem/intune/apps/store-apps-windows)
|
||||
- [What is co-management?](/mem/configmgr/comanage/overview)
|
||||
- [Use the Company Portal app on co-managed devices](/mem/configmgr/comanage/company-portal)
|
||||
@ -73,7 +73,7 @@ To install the Company Portal app, you have some options:
|
||||
|
||||
- **Use the Microsoft Store**: The Company Portal app is available in the Microsoft Store, and can be downloaded by your users. Users open the Microsoft Store app on their device, search for **Company Portal**, and install it. When it's installed, users might be prompted to sign in with their organization account (`user@contoso.com`). When the app opens, they see a list of approved organization apps that can be installed.
|
||||
|
||||
- This option requires users to install the Company Portal app themselves. If you have many users, the recommended approach is to deploy the Company Portal app using Endpoint Manager or using Windows Autopilot.
|
||||
- This option requires users to install the Company Portal app themselves. If you have many users, the recommended approach is to deploy the Company Portal app using Intune or using Windows Autopilot.
|
||||
|
||||
- When the Company Portal app is installed from the Microsoft Store app, by default, it's automatically updated. Users can also open the Microsoft Store, go to the **Library**, and check for updates. Within the Company Portal app, they can use the update feature to get app fixes and feature updates on the organization apps you added.
|
||||
|
||||
@ -101,4 +101,4 @@ If you use a third party or partner MDM provider, be sure to configure the setti
|
||||
|
||||
## Windows Package Manager
|
||||
|
||||
If your organization creates its own apps, your app developers can use [Windows Package Manager](/windows/package-manager/) to deploy apps. For more information on Endpoint Manager and Windows Package Manager, see [Evolving the Microsoft Store for Business and Education](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/evolving-the-microsoft-store-for-business-and-education/ba-p/2569423).
|
||||
If your organization creates its own apps, your app developers can use [Windows Package Manager](/windows/package-manager/) to deploy apps. For more information on Intune and Windows Package Manager, see [Evolving the Microsoft Store for Business and Education](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/evolving-the-microsoft-store-for-business-and-education/ba-p/2569423).
|
||||
|
@ -1,6 +1,6 @@
|
||||
---
|
||||
title: Deploy and configure App-V apps using MDM
|
||||
description: Configure, deploy, and manage Microsoft Application Virtualization (App-V) apps using Microsoft Endpoint Manager or App-V server.
|
||||
description: Configure, deploy, and manage Microsoft Application Virtualization (App-V) apps using Microsoft Intune or App-V server.
|
||||
ms.author: vinpa
|
||||
ms.topic: article
|
||||
ms.prod: windows-client
|
||||
@ -15,7 +15,7 @@ manager: aaroncz
|
||||
|
||||
## Executive summary
|
||||
|
||||
<p>Microsoft Application Virtualization (App-V) apps have typically been configured, deployed, and managed through on-premises group policies using Microsoft Endpoint Manager or App-V server. In Windows 10, version 1703, App-V apps can be configured, deployed, and managed using mobile device management (MDM), matching their on-premises counterparts.</p>
|
||||
<p>Microsoft Application Virtualization (App-V) apps have typically been configured, deployed, and managed through on-premises group policies or App-V server. In Windows 10, version 1703, App-V apps can be configured, deployed, and managed using mobile device management (MDM), matching their on-premises counterparts.</p>
|
||||
|
||||
<p>MDM services can be used to publish App-V packages to clients running Windows 10, version 1703 (or later). All capabilities such as App-V enablement, configuration, and publishing can be completed using the EnterpriseAppVManagement CSP.</p>
|
||||
|
||||
|
@ -28,12 +28,12 @@ Bulk enrollment is an efficient way to set up a large number of devices to be ma
|
||||
|
||||
On the desktop, you can create an Active Directory account, such as "enrollment@contoso.com" and give it only the ability to join the domain. Once the desktop is joined with that admin account, then standard users in the domain can sign in to use it. This account is especially useful in getting a large number of desktop ready to use within a domain.
|
||||
|
||||
On the desktop and mobile devices, you can use an enrollment certificate or enrollment username and password, such as "enroll@contoso.com" and "enrollmentpassword." These credentials are used in the provisioning package, which you can use to enroll multiple devices to the MDM service. Once the devices are joined, many users can use them.
|
||||
On the desktop and mobile devices, you can use an enrollment certificate or enrollment username and password, such as `enroll@contoso.com` and `enrollmentpassword`. These credentials are used in the provisioning package, which you can use to enroll multiple devices to the MDM service. Once the devices are joined, many users can use them.
|
||||
|
||||
> [!NOTE]
|
||||
> - Bulk-join is not supported in Azure Active Directory Join.
|
||||
> - Bulk enrollment does not work in Intune standalone environment.
|
||||
> - Bulk enrollment works in Microsoft Endpoint Manager where the ppkg is generated from the Configuration Manager console.
|
||||
> - Bulk enrollment works in Microsoft Intune where the ppkg is generated from the Configuration Manager console.
|
||||
> - To change bulk enrollment settings, login to **AAD**, then **Devices**, and then click **Device Settings**. Change the number under **Maximum number of devices per user**.
|
||||
> - Bulk Token creation is not supported with federated accounts.
|
||||
|
||||
@ -53,14 +53,14 @@ On the desktop and mobile devices, you can use an enrollment certificate or enro
|
||||
Using the WCD, create a provisioning package using the enrollment information required by your organization. Ensure that you have all the configuration settings.
|
||||
|
||||
1. Open the WCD tool.
|
||||
2. Click **Advanced Provisioning**.
|
||||
2. Select **Advanced Provisioning**.
|
||||
|
||||

|
||||
3. Enter a project name and click **Next**.
|
||||
4. Select **All Windows editions**, since Provisioning CSP is common to all Windows editions, then click **Next**.
|
||||
5. Skip **Import a provisioning package (optional)** and click **Finish**.
|
||||
3. Enter a project name and select **Next**.
|
||||
4. Select **All Windows editions**, since Provisioning CSP is common to all Windows editions, then select **Next**.
|
||||
5. Skip **Import a provisioning package (optional)** and select **Finish**.
|
||||
6. Expand **Runtime settings** > **Workplace**.
|
||||
7. Click **Enrollments**, enter a value in **UPN**, and then click **Add**.
|
||||
7. Select **Enrollments**, enter a value in **UPN**, and then select **Add**.
|
||||
The UPN is a unique identifier for the enrollment. For bulk enrollment, this UPN must be a service account that is allowed to enroll multiple users, such as "enrollment@contoso.com".
|
||||
8. On the left navigation pane, expand the **UPN** and then enter the information for the rest of the settings for enrollment process.
|
||||
Here's the list of available settings:
|
||||
@ -74,8 +74,8 @@ Using the WCD, create a provisioning package using the enrollment information re
|
||||
|
||||

|
||||
9. Configure the other settings, such as the Wi-Fi connections so that the device can join a network before joining MDM (for example, **Runtime settings** > **ConnectivityProfiles** > **WLANSetting**).
|
||||
10. When you're done adding all the settings, on the **File** menu, click **Save**.
|
||||
11. On the main menu, click **Export** > **Provisioning package**.
|
||||
10. When you're done adding all the settings, on the **File** menu, select **Save**.
|
||||
11. On the main menu, select **Export** > **Provisioning package**.
|
||||
|
||||

|
||||
12. Enter the values for your package and specify the package output location.
|
||||
@ -83,7 +83,7 @@ Using the WCD, create a provisioning package using the enrollment information re
|
||||

|
||||

|
||||

|
||||
13. Click **Build**.
|
||||
13. Select **Build**.
|
||||
|
||||

|
||||
14. Apply the package to some test devices and verify that they work. For more information, see [Apply a provisioning package](#apply-a-provisioning-package).
|
||||
@ -94,13 +94,13 @@ Using the WCD, create a provisioning package using the enrollment information re
|
||||
Using the WCD, create a provisioning package using the enrollment information required by your organization. Ensure that you have all the configuration settings.
|
||||
|
||||
1. Open the WCD tool.
|
||||
2. Click **Advanced Provisioning**.
|
||||
3. Enter a project name and click **Next**.
|
||||
2. Select **Advanced Provisioning**.
|
||||
3. Enter a project name and select **Next**.
|
||||
4. Select **Common to all Windows editions**, since Provisioning CSP is common to all Windows editions.
|
||||
5. Skip **Import a provisioning package (optional)** and click **Finish**.
|
||||
5. Skip **Import a provisioning package (optional)** and select **Finish**.
|
||||
6. Specify the certificate.
|
||||
1. Go to **Runtime settings** > **Certificates** > **ClientCertificates**.
|
||||
2. Enter a **CertificateName** and then click **Add**.
|
||||
2. Enter a **CertificateName** and then select **Add**.
|
||||
3. Enter the **CertificatePasword**.
|
||||
4. For **CertificatePath**, browse and select the certificate to be used.
|
||||
5. Set **ExportCertificate** to False.
|
||||
@ -109,7 +109,7 @@ Using the WCD, create a provisioning package using the enrollment information re
|
||||

|
||||
7. Specify the workplace settings.
|
||||
1. Got to **Workplace** > **Enrollments**.
|
||||
2. Enter the **UPN** for the enrollment and then click **Add**.
|
||||
2. Enter the **UPN** for the enrollment and then select **Add**.
|
||||
The UPN is a unique identifier for the enrollment. For bulk enrollment, this UPN must be a service account that is allowed to enroll multiple users, such as "enrollment@contoso.com".
|
||||
3. On the left column, expand the **UPN** and then enter the information for the rest of the settings for enrollment process.
|
||||
Here's the list of available settings:
|
||||
@ -120,32 +120,32 @@ Using the WCD, create a provisioning package using the enrollment information re
|
||||
- **Secret** - the certificate thumbprint.
|
||||
For detailed descriptions of these settings, see [Provisioning CSP](mdm/provisioning-csp.md).
|
||||
8. Configure the other settings, such as the Wi-Fi connection so that the device can join a network before joining MDM (for example, **Runtime settings** > **ConnectivityProfiles** > **WLANSetting**).
|
||||
9. When you're done adding all the settings, on the **File** menu, click **Save**.
|
||||
9. When you're done adding all the settings, on the **File** menu, select **Save**.
|
||||
10. Export and build the package (steps 10-13 in the procedure above).
|
||||
11. Apply the package to some test devices and verify that they work. For more information, see [Apply a provisioning package](#apply-a-provisioning-package).
|
||||
12. Apply the package to your devices.
|
||||
|
||||
## Apply a provisioning package
|
||||
|
||||
Here's the list of topics about applying a provisioning package:
|
||||
Here's the list of articles about applying a provisioning package:
|
||||
|
||||
- [Apply a package on the first-run setup screen (out-of-the-box experience)](/windows/configuration/provisioning-packages/provision-pcs-for-initial-deployment#apply-package) - topic in Technet.
|
||||
- [Apply a package to a Windows desktop edition image](/windows/configuration/provisioning-packages/provisioning-create-package#to_apply_a_provisioning_package_to_a_desktop_image) - topic in MSDN
|
||||
- [Apply a package from the Settings menu](#apply-a-package-from-the-settings-menu) - topic below
|
||||
- [Apply a package on the first-run setup screen (out-of-the-box experience)](/windows/configuration/provisioning-packages/provision-pcs-for-initial-deployment#apply-package)
|
||||
- [Apply a package to a Windows desktop edition image](/windows/configuration/provisioning-packages/provisioning-create-package#to_apply_a_provisioning_package_to_a_desktop_image)
|
||||
- [Apply a package from the Settings menu](#apply-a-package-from-the-settings-menu) - article below
|
||||
|
||||
## Apply a package from the Settings menu
|
||||
|
||||
1. Go to **Settings** > **Accounts** > **Access work or school**.
|
||||
2. Click **Add or remove a provisioning package**.
|
||||
3. Click **Add a package**.
|
||||
2. Select **Add or remove a provisioning package**.
|
||||
3. Select **Add a package**.
|
||||
|
||||
## <a href="" id="validate-that-the-provisioning-package-was-applied-"></a>Validate that the provisioning package was applied
|
||||
|
||||
1. Go to **Settings** > **Accounts** > **Access work or school**.
|
||||
2. Click **Add or remove a provisioning package**.
|
||||
2. Select **Add or remove a provisioning package**.
|
||||
You should see your package listed.
|
||||
|
||||
## Retry logic in case of a failure
|
||||
## Retry logic if there's a failure
|
||||
|
||||
If the provisioning engine receives a failure from a CSP, it will retry to provision three times in a row.
|
||||
|
||||
@ -155,9 +155,9 @@ It will also retry to apply the provisioning each time it's launched, if started
|
||||
|
||||
In addition, provisioning will be restarted in a SYSTEM context after a sign in and the system has been idle ([details on idle conditions](/windows/win32/taskschd/task-idle-conditions)).
|
||||
|
||||
## Other provisioning topics
|
||||
## Other provisioning articles
|
||||
|
||||
Here are links to step-by-step provisioning topics in Technet.
|
||||
Here are links to step-by-step provisioning articles:
|
||||
|
||||
- [Provision PCs with apps and certificates for initial deployment](/windows/configuration/provisioning-packages/provision-pcs-with-apps)
|
||||
- [Provision PCs with common settings for initial deployment](/windows/configuration/provisioning-packages/provision-pcs-for-initial-deployment)
|
||||
|
@ -38,10 +38,10 @@ Config lock will be available for all Windows Professional and Enterprise Editio
|
||||
|
||||
Config lock isn't enabled by default, or turned on by the OS during boot. Rather, you need to turn it on.
|
||||
|
||||
The steps to turn on config lock using Microsoft Endpoint Manager (Microsoft Intune) are as follows:
|
||||
The steps to turn on config lock using Microsoft Intune are as follows:
|
||||
|
||||
1. Ensure that the device to turn on config lock is enrolled in Microsoft Intune.
|
||||
1. From the Microsoft Intune portal main page, select **Devices** > **Configuration Profiles** > **Create a profile**.
|
||||
1. In the [Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Devices** > **Configuration Profiles** > **Create a profile**.
|
||||
1. Select the following and press **Create**:
|
||||
- **Platform**: Windows 10 and later
|
||||
- **Profile type**: Templates
|
||||
|
@ -15,7 +15,7 @@ ms.topic: overview
|
||||
|
||||
Use of personal devices for work, and employees working outside the office, may be changing how your organization manages devices. Certain parts of your organization might require deep, granular control over devices, while other parts might seek lighter, scenario-based management that empowers the modern workforce. Windows 10 offers the flexibility to respond to these changing requirements, and can easily be deployed in a mixed environment. You can shift the percentage of Windows 10 devices gradually, following the normal upgrade schedules used in your organization.
|
||||
|
||||
Your organization might have considered bringing in Windows 10 devices and downgrading them to an earlier version of Windows until everything is in place for a formal upgrade process. While this downgrade may appear to save costs due to standardization, greater savings can come from avoiding the downgrade and immediately taking advantage of the cost reductions Windows 10 can provide. Because Windows 10 devices can be managed using the same processes and technology as other previous Windows versions, it's easy for versions to coexist.
|
||||
Your organization might have considered bringing in Windows 10 devices and downgrading them to an earlier version of Windows until everything is in place for a formal upgrade process. This downgrade may appear to save costs due to standardization. But, you typically save more if you don't downgrade, and immediately taking advantage of the cost reductions Windows 10 can provide. Because Windows 10 devices can be managed using the same processes and technology as other previous Windows versions, it's easy for versions to coexist.
|
||||
|
||||
Your organization can support various operating systems across a wide range of device types, and manage them through a common set of tools such as Microsoft Endpoint Configuration Manager, Microsoft Intune, or other third-party products. This "managed diversity" enables you to empower your users to benefit from the productivity enhancements available on their new Windows 10 devices (including rich touch and ink support), while still maintaining your standards for security and manageability. It can help you and your organization benefit from Windows 10 much faster.
|
||||
|
||||
@ -114,7 +114,7 @@ MDM with Intune provide tools for applying Windows updates to client computers i
|
||||
|
||||
There are various steps you can take to begin the process of modernizing device management in your organization:
|
||||
|
||||
**Assess current management practices, and look for investments you might make today.** Which of your current practices need to stay the same, and which can you change? Specifically, what elements of traditional management do you need to retain and where can you modernize? Whether you take steps to minimize custom imaging, reevaluate settings management, or reassesses authentication and compliance, the benefits can be immediate. You can use [Group policy analytics in Microsoft Endpoint Manager](/mem/intune/configuration/group-policy-analytics) to help determine which group policies supported by cloud-based MDM providers, including Microsoft Intune.
|
||||
**Assess current management practices, and look for investments you might make today.** Which of your current practices need to stay the same, and which can you change? Specifically, what elements of traditional management do you need to retain and where can you modernize? Whether you take steps to minimize custom imaging, reevaluate settings management, or reassesses authentication and compliance, the benefits can be immediate. You can use [Group policy analytics in Microsoft Intune](/mem/intune/configuration/group-policy-analytics) to help determine which group policies supported by cloud-based MDM providers, including Microsoft Intune.
|
||||
|
||||
**Assess the different use cases and management needs in your environment.** Are there groups of devices that could benefit from lighter, simplified management? BYOD devices, for example, are natural candidates for cloud-based management. Users or devices handling more highly regulated data might require an on-premises Active Directory domain for authentication. Configuration Manager and EMS provide you the flexibility to stage implementation of modern management scenarios while targeting different devices the way that best suits your business needs.
|
||||
|
||||
|
@ -73,13 +73,13 @@ This node specifies the username for a new local user account. This setting can
|
||||
This node specifies the password for a new local user account. This setting can be managed remotely.
|
||||
|
||||
Supported operation is Add.
|
||||
GET operation isn't supported. This setting will report as failed when deployed from the Endpoint Manager.
|
||||
GET operation isn't supported. This setting will report as failed when deployed from Intune.
|
||||
|
||||
<a href="" id="users-username-localusergroup"></a>**Users/_UserName_/LocalUserGroup**
|
||||
This optional node specifies the local user group that a local user account should be joined to. If the node isn't set, the new local user account is joined just to the Standard Users group. Set the value to 2 for Administrators group. This setting can be managed remotely.
|
||||
|
||||
Supported operation is Add.
|
||||
|
||||
## Related topics
|
||||
## Related articles
|
||||
|
||||
[Configuration service provider reference](index.yml)
|
||||
|
@ -25,7 +25,7 @@ The table below shows the applicability of Windows:
|
||||
|
||||
Windows Defender Application Control (WDAC) policies can be managed from an MDM server, or locally by using PowerShell via the WMI Bridge through the ApplicationControl configuration service provider (CSP). The ApplicationControl CSP was added in Windows 10, version 1903. This CSP provides expanded diagnostic capabilities and support for [multiple policies](/windows/security/threat-protection/windows-defender-application-control/deploy-multiple-windows-defender-application-control-policies) (introduced in Windows 10, version 1903). It also provides support for rebootless policy deployment (introduced in Windows 10, version 1709). Unlike the [AppLocker CSP](applocker-csp.md), the ApplicationControl CSP correctly detects the presence of no-reboot option and consequently doesn't schedule a reboot.
|
||||
|
||||
Existing Windows Defender Application Control (WDAC) policies deployed using the AppLocker CSP's CodeIntegrity node can now be deployed using the ApplicationControl CSP URI. Although, WDAC policy deployment via the AppLocker CSP will continue to be supported, all new feature work will be done in the ApplicationControl CSP only.
|
||||
Existing Windows Defender Application Control (WDAC) policies deployed using the AppLocker CSP's CodeIntegrity node can now be deployed using the ApplicationControl CSP URI. Although WDAC policy deployment using the AppLocker CSP will continue to be supported, all new feature work will be done in the ApplicationControl CSP only.
|
||||
|
||||
The following example shows the ApplicationControl CSP in tree format.
|
||||
|
||||
@ -150,9 +150,9 @@ Scope is dynamic. Supported operation is Get.
|
||||
|
||||
Value type is char.
|
||||
|
||||
## Microsoft Endpoint Manager Intune Usage Guidance
|
||||
## Microsoft Intune Usage Guidance
|
||||
|
||||
For customers using Intune standalone or hybrid management with Microsoft Endpoint Configuration Manager to deploy custom policies via the ApplicationControl CSP, refer to [Deploy Windows Defender Application Control policies by using Microsoft Intune](/windows/security/threat-protection/windows-defender-application-control/deploy-windows-defender-application-control-policies-using-intune).
|
||||
For customers using Intune standalone or hybrid management with Configuration Manager to deploy custom policies via the ApplicationControl CSP, refer to [Deploy Windows Defender Application Control policies by using Microsoft Intune](/windows/security/threat-protection/windows-defender-application-control/deploy-windows-defender-application-control-policies-using-intune).
|
||||
|
||||
## Generic MDM Server Usage Guidance
|
||||
|
||||
@ -329,6 +329,6 @@ New-CimInstance -Namespace $namespace -ClassName $policyClassName -Property @{Pa
|
||||
Get-CimInstance -Namespace $namespace -ClassName $policyClassName
|
||||
```
|
||||
|
||||
## Related topics
|
||||
## Related articles
|
||||
|
||||
[Configuration service provider reference](index.yml)
|
@ -59,7 +59,7 @@ manager: aaroncz
|
||||
<!--Description-->
|
||||
This policy setting provides the list of URLs (separated by Unicode character 0xF000) to endpoints accessible only within an enterprise's network. If any of the URLs can be resolved over HTTPS, the network would be considered authenticated.
|
||||
|
||||
When entering a list of TLS endpoints in Microsoft Endpoint Manager, you must follow this format, even in the UI:
|
||||
When entering a list of TLS endpoints in Microsoft Intune, you must follow this format, even in the UI:
|
||||
|
||||
`<![CDATA[https://nls.corp.contoso.comhttps://nls.corp.fabricam.com]]>`
|
||||
|
||||
@ -107,6 +107,6 @@ This policy setting provides the string that is to be used to name a network. Th
|
||||
|
||||
<!--/Policies-->
|
||||
|
||||
## Related topics
|
||||
## Related articles
|
||||
|
||||
[Policy configuration service provider](policy-configuration-service-provider.md)
|
@ -123,13 +123,13 @@ For more information, visit [Install Quick Assist](https://support.microsoft.com
|
||||
|
||||
Before installing Quick Assist, you'll need to set up synchronization between Intune and Microsoft Store for Business. If you've already set up sync, log into [Microsoft Store for Business](https://businessstore.microsoft.com) and skip to step 5.
|
||||
|
||||
1. Go to [Microsoft Endpoint Manager admin center](https://endpoint.microsoft.com/) and navigate to **Tenant administration** / **Connectors and tokens** / **Microsoft Store for Business** and verify that **Microsoft Store for Business sync** is set to **Enable**.
|
||||
1. In the [Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Tenant administration** / **Connectors and tokens** / **Microsoft Store for Business** and verify that **Microsoft Store for Business sync** is set to **Enable**.
|
||||
1. Using your Global Admin account, log into [Microsoft Store for Business](https://businessstore.microsoft.com).
|
||||
1. Select **Manage** / **Settings** and turn on **Show offline apps**.
|
||||
1. Choose the **Distribute** tab and verify that **Microsoft Intune** is **Active**. You may need to use the **+Add management tool** link if it's not.
|
||||
1. Search for **Quick Assist** and select it from the Search results.
|
||||
1. Choose the **Offline** license and select **Get the app**
|
||||
1. From the Intune portal (Endpoint Manager admin center) choose **Sync**.
|
||||
1. In the Endpoint Manager admin center, choose **Sync**.
|
||||
1. Navigate to **Apps** / **Windows** and you should see **Quick Assist (Offline)** in the list.
|
||||
1. Select it to view its properties. By default, the app won't be assigned to anyone or any devices, select the **Edit** link.
|
||||
1. Assign the app to the required group of devices and choose **Review + save** to complete the application install.
|
||||
|
@ -16,7 +16,7 @@ author: jgeurten
|
||||
ms.reviewer: jsuther
|
||||
ms.author: vinpa
|
||||
manager: aaroncz
|
||||
ms.date: 10/27/2022
|
||||
ms.date: 11/01/2022
|
||||
---
|
||||
|
||||
# Microsoft recommended driver block rules
|
||||
@ -49,9 +49,9 @@ With Windows 11 2022 update, the vulnerable driver blocklist is enabled by defa
|
||||
|
||||
> [!NOTE]
|
||||
>
|
||||
> - The Windows Security app is updated separately from the OS and ships out of box. The version with the vulnerable driver blocklist toggle is in the final validation ring and will ship to all customers very soon.
|
||||
> - The Windows Security app is updated separately from the OS and ships out of box. The version with the vulnerable driver blocklist toggle is in the final validation ring and will ship to all customers very soon. Initially, you will be able to view the configuration state only and the toggle will appear grayed out. The ability to turn the toggle on or off will come with a future Windows update.
|
||||
>
|
||||
> - The option to turn Microsoft's vulnerable driver blocklist on or off using the Windows Security app is grayed out when HVCI, Smart App Control, or S mode is enabled. You must disable HVCI or Smart App Control, or switch the device out of S mode, and restart the device before you can turn off the Microsoft vulnerable driver blocklist.
|
||||
> - For Windows Insiders, the option to turn Microsoft's vulnerable driver blocklist on or off using the Windows Security app is grayed out when HVCI, Smart App Control, or S mode is enabled. You must disable HVCI or Smart App Control, or switch the device out of S mode, and restart the device before you can turn off the Microsoft vulnerable driver blocklist.
|
||||
|
||||
The blocklist is updated with each new major release of Windows, typically 1-2 times per year, including most recently with the Windows 11 2022 update released in September 2022. The most current blocklist is now also available for Windows 10 20H2 and Windows 11 21H2 users as an optional update from Windows Update. Microsoft will occasionally publish future updates through regular Windows servicing.
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user