mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-06-18 11:53:37 +00:00
Merge branch 'main' into vp-csp-auto3
This commit is contained in:
@ -11,12 +11,12 @@ ms.reviewer:
|
||||
manager: aaroncz
|
||||
---
|
||||
|
||||
# Azure AD and Microsoft Intune: Automatic MDM enrollment in the Endpoint Manager admin center
|
||||
# Azure AD and Microsoft Intune: Automatic MDM enrollment in the Intune admin center
|
||||
|
||||
Microsoft Intune can be accessed directly using its own admin center. For more information, go to:
|
||||
|
||||
- [Tutorial: Walkthrough Intune in Microsoft Endpoint Manager admin center](/mem/intune/fundamentals/tutorial-walkthrough-endpoint-manager)
|
||||
- Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
|
||||
- [Tutorial: Walkthrough Intune in Microsoft Intune admin center](/mem/intune/fundamentals/tutorial-walkthrough-endpoint-manager)
|
||||
- Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
|
||||
|
||||
If you use the Azure portal, then you can access Intune using the following steps:
|
||||
|
||||
|
@ -41,7 +41,7 @@ Config lock isn't enabled by default, or turned on by the OS during boot. Rather
|
||||
The steps to turn on config lock using Microsoft Intune are as follows:
|
||||
|
||||
1. Ensure that the device to turn on config lock is enrolled in Microsoft Intune.
|
||||
1. In the [Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Devices** > **Configuration Profiles** > **Create a profile**.
|
||||
1. In the [Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Devices** > **Configuration Profiles** > **Create a profile**.
|
||||
1. Select the following and press **Create**:
|
||||
- **Platform**: Windows 10 and later
|
||||
- **Profile type**: Templates
|
||||
|
@ -2774,7 +2774,7 @@ This policy setting allows you to audit events generated by attempts to access t
|
||||
- If you do not configure this policy setting, no audit event is generated when an attempt to access a kernel object is made.
|
||||
|
||||
> [!NOTE]
|
||||
> Only the System Access Control List (SACL) for SAM_SERVER can be modified. Volume High on domain controllers. For information about reducing the amount of events generated in this subcategory, see [article 841001 in the Microsoft Knowledge Base](https://go.microsoft.com/fwlink/?LinkId=121698).
|
||||
> Only the System Access Control List (SACL) for SAM_SERVER can be modified. Volume High on domain controllers. For information about SACL, see [Access control lists](/windows/win32/secauthz/access-control-lists).
|
||||
<!-- ObjectAccess_AuditSAM-Description-End -->
|
||||
|
||||
<!-- ObjectAccess_AuditSAM-Editable-Begin -->
|
||||
|
@ -1767,7 +1767,7 @@ _**Turn syncing off by default but don’t disable**_
|
||||
|
||||
<!-- EnableOrganizationalMessages-Description-Begin -->
|
||||
<!-- Description-Source-DDF -->
|
||||
Organizational messages allow Administrators to deliver messages to their end users on selected Windows 11 experiences. Organizational messages are available to Administrators via services like Microsoft Endpoint Manager. By default, this policy is disabled.
|
||||
Organizational messages allow Administrators to deliver messages to their end users on selected Windows 11 experiences. Organizational messages are available to Administrators via services like Microsoft Intune. By default, this policy is disabled.
|
||||
- If you enable this policy, these experiences will show content booked by Administrators. Enabling this policy will have no impact on existing MDM policy settings governing delivery of content from Microsoft on Windows experiences.
|
||||
<!-- EnableOrganizationalMessages-Description-End -->
|
||||
|
||||
|
@ -122,13 +122,13 @@ For more information, visit [Install Quick Assist](https://support.microsoft.com
|
||||
|
||||
Before installing Quick Assist, you'll need to set up synchronization between Intune and Microsoft Store for Business. If you've already set up sync, log into [Microsoft Store for Business](https://businessstore.microsoft.com) and skip to step 5.
|
||||
|
||||
1. In the [Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Tenant administration** / **Connectors and tokens** / **Microsoft Store for Business** and verify that **Microsoft Store for Business sync** is set to **Enable**.
|
||||
1. In the [Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431), go to **Tenant administration** / **Connectors and tokens** / **Microsoft Store for Business** and verify that **Microsoft Store for Business sync** is set to **Enable**.
|
||||
1. Using your Global Admin account, log into [Microsoft Store for Business](https://businessstore.microsoft.com).
|
||||
1. Select **Manage** / **Settings** and turn on **Show offline apps**.
|
||||
1. Choose the **Distribute** tab and verify that **Microsoft Intune** is **Active**. You may need to use the **+Add management tool** link if it's not.
|
||||
1. Search for **Quick Assist** and select it from the Search results.
|
||||
1. Choose the **Offline** license and select **Get the app**
|
||||
1. In the Endpoint Manager admin center, choose **Sync**.
|
||||
1. In the Intune admin center, choose **Sync**.
|
||||
1. Navigate to **Apps** / **Windows** and you should see **Quick Assist (Offline)** in the list.
|
||||
1. Select it to view its properties. By default, the app won't be assigned to anyone or any devices, select the **Edit** link.
|
||||
1. Assign the app to the required group of devices and choose **Review + save** to complete the application install.
|
||||
|
Reference in New Issue
Block a user