Commit Graph

106 Commits

Author SHA1 Message Date
af8ad26bcf Merge branch 'master' into v-gmoor-fix-enroll-a-windows-10-device-automatically-using-group-policy.md 2021-04-22 17:27:13 -07:00
e3888d913f Corrections to layout 2021-04-22 14:54:56 -07:00
8a2e120cf0 Modification in Steps
There were few steps recommended by the user to fit in the document and make the document more clear. I have added a few of the recommendations based on the tests.

Problem: https://github.com/MicrosoftDocs/windows-itpro-docs/issues/8557
2021-04-14 13:24:52 +05:00
74c8191dc0 Links: Windows - client-management (2021-01) 2021-03-25 06:59:20 -07:00
b826599ca9 Merge pull request #8746 from MaratMussabekov/patch-239
Updated note
2020-12-04 15:52:11 -08:00
32a997f041 Update enroll-a-windows-10-device-automatically-using-group-policy.md
minor edits
2020-12-04 15:45:34 -08:00
446deee5f0 Update windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
Co-authored-by: Trond B. Krokli <38162891+illfated@users.noreply.github.com>
2020-12-04 15:43:50 -08:00
678b680a2d Update enroll-a-windows-10-device-automatically-using-group-policy.md 2020-12-03 11:34:26 +05:00
9de8233860 Update enroll-a-windows-10-device-automatically-using-group-policy.md
This is my own PR , i read that article , and i found latest administrative templates  of october  20h2 is missing , so i added to this article
2020-12-03 06:07:39 +05:30
f5f8448226 Merge branch 'public' into patch-111 2020-12-01 16:47:31 -08:00
8a7931d256 Client Management/MDM: URL & text correction
As outlined in issue ticket #8682 (3rd bullet point in Requirements section is confusing, and linked page is unrelated to the link's text), "The linked page contains basically no information about registering your "enterprise AD" with Azure AD. Instead, that page is a somewhat convoluted set of sections that are sort of unrelated to anything specific."

Thanks to Jeremy T. Bradshaw (JeremyTBradshaw) for identifying and reporting this issue.

Changes proposed:
- change the MDM page link URL to a more precise Azure AD page link
- change the 3rd bullet point text to refer to the new page link

Whitespace changes:
- remove end-of-line redundant whitespace (blanks)

Closes #8682
2020-11-26 22:08:59 +01:00
912cb59342 Fixes to layout and grammar 2020-11-20 13:58:42 -08:00
9ee9623a80 updated link for november admx link
as per the user report #8655, i so i updated the link
2020-11-17 22:25:09 +05:30
43d8e0eb44 Update windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
Co-authored-by: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>
2020-11-16 19:06:47 +05:00
0926a1ee2c Update enroll-a-windows-10-device-automatically-using-group-policy.md 2020-11-08 13:24:31 +05:00
f992bbbfa8 Update enroll-a-windows-10-device-automatically-using-group-policy.md
**Device Credential** is not supported for enrollment type when you have a ConfigMgr Agent on your device.
2020-10-29 22:24:55 +01:00
1179833957 Update enroll-a-windows-10-device-automatically-using-group-policy.md
as per the user report #8149, so i added admx templates links for windows 10 v1909 and v2004.
Also, I adjusted the style format.
2020-08-26 22:07:03 +05:30
feee20e4a0 Updated short descriptions for SEO improvement 2020-08-14 23:07:55 -07:00
1794d0baea Update enroll-a-windows-10-device-automatically-using-group-policy.md 2020-08-04 06:39:58 -07:00
979a3b9635 Correct broken "Important" note and transition to body text
This change corrects a broken "Important" note that might've included two procedures. I've fixed the note and revised it to not encapsulate the two procedures.
2020-07-10 17:35:13 -07:00
524bd8bbcf Added bullets to lists that were vertical only in source
The rendered versions looked like a jumble
2020-07-10 17:12:45 -07:00
4e87357b9e Added bold to UI text/navigation 2020-07-10 16:54:09 -07:00
e458cdf5c9 Merge pull request #6833 from kannanb-github/patch-5
User credential preferred
2020-07-10 12:12:48 -07:00
eae1ee0b23 Corrections to layout and punctuation 2020-05-29 14:56:27 -07:00
08e8dc62ac User credential preferred
Even though Device Credential is an option on the GPO, the device credential gives error while auto-enrollment tasks running through the Task Scheduler. To avoid this error we need to choose the User Credential option from the dropdown to auto-enroll the device. The below line has been updated on the document.
5. Click **Enable**, and select **User Credential** from the dropdown **Select Credential Type to Use**, then click **OK**.
2020-05-28 15:37:11 +05:30
14e27eb9ae Merge branch 'public' into patch-4 2020-05-11 22:17:20 +01:00
cea9e00472 Update enroll-a-windows-10-device-automatically-using-group-policy.md 2020-05-11 14:39:07 +05:00
aa042aac69 Update windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com>
2020-03-26 17:04:02 -07:00
ba70c463d1 Added admx file link of 1909
As per user report #6335.
I added the download link for Administrative templates for windows 10 1909.
**https://www.microsoft.com/download/100591**
2020-03-26 23:43:06 +05:30
0d2ee0d912 CAT Auto Pulish for Windows Release Messages - 20200219134607 (#2081)
* Update vpnv2-profile-xsd.md

<MachineMethod>Eap</MachineMethod> should’t be in the example, because

1.  MachineMethod can only be Certificate 
------ see https://docs.microsoft.com/en-gb/windows/client-management/mdm/vpnv2-csp 
........................VPNv2/ProfileName/NativeProfile/Authentication/MachineMethod
                         This is only supported in IKEv2.
                                This value can be one of the following:
                                •	Certificate

2. A profile conatins either UserMethod or MachineMethod but not both

* Update advanced-troubleshooting-802-authentication.md

* missing "r" in $OSArch

https://github.com/MicrosoftDocs/windows-itpro-docs/issues/5972

* Update windows/client-management/advanced-troubleshooting-802-authentication.md

Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>

* Update windows/client-management/advanced-troubleshooting-802-authentication.md

Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>

* Update windows/client-management/advanced-troubleshooting-802-authentication.md

Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com>

* Test, updated Caps

* Update windows/client-management/advanced-troubleshooting-802-authentication.md

Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>

* Multiple corrections required (see notes)

@Dansimp 

1) This note is contradictory - need to clarify this:
"> [!NOTE]
> Device credential group policy setting is not supported for enrolling into Microsoft Intune. "
2) We should remove all references to "Primary Domain Controller" (PDC) - it's not the 90's with Windows NT 4.0 anymore !
3) "Restart the Domain Controller for the policy to be available."
   A reboot is not required
4) "Enforce a GPO link"
   This is in contradiction with our recommended practices. We should not be suggesting this.

* Update web-content-filtering.md

fixed extra space

* CAT Auto Pulish for Windows Release Messages - CAT_AutoPublish_20200219114538 (#2080)

Co-authored-by: Direesh Kumar Kandakatla <direek@microsoft.com>

Co-authored-by: rogersoMS <44718379+rogersoMS@users.noreply.github.com>
Co-authored-by: Daniel Simpson <dansimp@microsoft.com>
Co-authored-by: Office Content Publishing <34616516+officedocspr@users.noreply.github.com>
Co-authored-by: Tina Burden <v-tibur@microsoft.com>
Co-authored-by: Direesh Kumar Kandakatla <direek@microsoft.com>
2020-02-19 13:58:02 -08:00
81c6d7cd10 Capitalized "azure" 2020-02-11 15:23:34 -08:00
030bc3a9e4 remove incorrect info and add note about expected behavior
https://github.com/MicrosoftDocs/windows-itpro-docs/issues/5432
2020-01-22 10:38:32 +02:00
229b88c69e Update windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com>
2019-10-22 09:02:28 +01:00
44ebc6107b Update enroll-a-windows-10-device-automatically-using-group-policy.md
Device credential automatic enrollment isnt supported by Intune. Added a note to call this out.
2019-10-21 14:33:10 -07:00
a2d920d7e7 Merge branch 'public' into patch-4 2019-10-09 09:29:42 +01:00
d8e924255b Merge branch 'public' into master 2019-10-07 13:30:00 -07:00
764463f940 Update windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com>
2019-10-07 18:01:50 +01:00
79e500a391 Update enroll-a-windows-10-device-automatically-using-group-policy.md 2019-10-07 17:43:56 +01:00
909f55ab30 1709 or later
References to 1709 updated (apart from one) to "1709 or later" to be correct
2019-10-07 09:48:14 +01:00
62190b32ae Updated GPO names to match the current version of Windows
Updated GPO name and links to files. Edited instructions to include new options in GPO and removed hyperlinks to older version of ADMX files (1803) and added links to newest version (1903)
2019-10-07 09:45:19 +01:00
22fe43ded8 Update windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com>
2019-10-07 09:28:02 +01:00
93a34f80f4 GPO Names and Behaviour Has Changed
"Enable automatic MDM enrollment using default Azure AD credentials" is the GPO name and it has two sub options. Not sure if Device Certificate is working at the moment, but the pictures are wrong, but User Certificate is working and so the docs should at least say to use that for now
2019-10-04 19:47:30 +01:00
f4f7a401c5 Update windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
- remove redundant parentheses

Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>
2019-10-03 17:40:49 +02:00
c60bdc6e2b Client Management/MDM: 1903 GPO ADMX templates
Description:
Administrative Templates (.admx) for Windows 10 May 2019 Update (1903)
v3.0 has been available since 2019-08-28 and this page needs updating
to reflect this change, as mentioned in issue ticket #5078.

Proposed changes:
- Remove the note saying that Windows 10 version 1903 is still on the
  Insider program and doesn't contain any downloadable templates yet.
- Add version number 1903 and its link to the list (under 1803 & 1809)
- Add folder information for the installed 1903 templates location
- Minor MarkDown space standardization adjustments
- Add missing blank line after one of the headings

issue ticket closure or reference:

Closes #5078
2019-10-02 04:42:03 +02:00
ae1e862cf3 Merge pull request #5009 from ShrCaJesmo/patch-1
Schedule task hidden from standard users
2019-09-30 09:38:30 -07:00
ceded06014 Merge branch 'master' into patch-1 2019-09-26 07:59:24 +02:00
04b493adde Update windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com>
2019-09-24 16:19:11 -04:00
ff603c68e9 Update windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com>
2019-09-24 14:29:18 +02:00
b8e0549a41 Update windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com>
2019-09-24 14:28:57 +02:00
4200f8facf Update windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com>
2019-09-24 10:23:06 +03:00