Commit Graph

139 Commits

Author SHA1 Message Date
feee20e4a0 Updated short descriptions for SEO improvement 2020-08-14 23:07:55 -07:00
1794d0baea Update enroll-a-windows-10-device-automatically-using-group-policy.md 2020-08-04 06:39:58 -07:00
979a3b9635 Correct broken "Important" note and transition to body text
This change corrects a broken "Important" note that might've included two procedures. I've fixed the note and revised it to not encapsulate the two procedures.
2020-07-10 17:35:13 -07:00
524bd8bbcf Added bullets to lists that were vertical only in source
The rendered versions looked like a jumble
2020-07-10 17:12:45 -07:00
4e87357b9e Added bold to UI text/navigation 2020-07-10 16:54:09 -07:00
e458cdf5c9 Merge pull request #6833 from kannanb-github/patch-5
User credential preferred
2020-07-10 12:12:48 -07:00
eae1ee0b23 Corrections to layout and punctuation 2020-05-29 14:56:27 -07:00
08e8dc62ac User credential preferred
Even though Device Credential is an option on the GPO, the device credential gives error while auto-enrollment tasks running through the Task Scheduler. To avoid this error we need to choose the User Credential option from the dropdown to auto-enroll the device. The below line has been updated on the document.
5. Click **Enable**, and select **User Credential** from the dropdown **Select Credential Type to Use**, then click **OK**.
2020-05-28 15:37:11 +05:30
14e27eb9ae Merge branch 'public' into patch-4 2020-05-11 22:17:20 +01:00
cea9e00472 Update enroll-a-windows-10-device-automatically-using-group-policy.md 2020-05-11 14:39:07 +05:00
aa042aac69 Update windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com>
2020-03-26 17:04:02 -07:00
ba70c463d1 Added admx file link of 1909
As per user report #6335.
I added the download link for Administrative templates for windows 10 1909.
**https://www.microsoft.com/download/100591**
2020-03-26 23:43:06 +05:30
0d2ee0d912 CAT Auto Pulish for Windows Release Messages - 20200219134607 (#2081)
* Update vpnv2-profile-xsd.md

<MachineMethod>Eap</MachineMethod> should’t be in the example, because

1.  MachineMethod can only be Certificate 
------ see https://docs.microsoft.com/en-gb/windows/client-management/mdm/vpnv2-csp 
........................VPNv2/ProfileName/NativeProfile/Authentication/MachineMethod
                         This is only supported in IKEv2.
                                This value can be one of the following:
                                •	Certificate

2. A profile conatins either UserMethod or MachineMethod but not both

* Update advanced-troubleshooting-802-authentication.md

* missing "r" in $OSArch

https://github.com/MicrosoftDocs/windows-itpro-docs/issues/5972

* Update windows/client-management/advanced-troubleshooting-802-authentication.md

Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>

* Update windows/client-management/advanced-troubleshooting-802-authentication.md

Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>

* Update windows/client-management/advanced-troubleshooting-802-authentication.md

Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com>

* Test, updated Caps

* Update windows/client-management/advanced-troubleshooting-802-authentication.md

Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>

* Multiple corrections required (see notes)

@Dansimp 

1) This note is contradictory - need to clarify this:
"> [!NOTE]
> Device credential group policy setting is not supported for enrolling into Microsoft Intune. "
2) We should remove all references to "Primary Domain Controller" (PDC) - it's not the 90's with Windows NT 4.0 anymore !
3) "Restart the Domain Controller for the policy to be available."
   A reboot is not required
4) "Enforce a GPO link"
   This is in contradiction with our recommended practices. We should not be suggesting this.

* Update web-content-filtering.md

fixed extra space

* CAT Auto Pulish for Windows Release Messages - CAT_AutoPublish_20200219114538 (#2080)

Co-authored-by: Direesh Kumar Kandakatla <direek@microsoft.com>

Co-authored-by: rogersoMS <44718379+rogersoMS@users.noreply.github.com>
Co-authored-by: Daniel Simpson <dansimp@microsoft.com>
Co-authored-by: Office Content Publishing <34616516+officedocspr@users.noreply.github.com>
Co-authored-by: Tina Burden <v-tibur@microsoft.com>
Co-authored-by: Direesh Kumar Kandakatla <direek@microsoft.com>
2020-02-19 13:58:02 -08:00
81c6d7cd10 Capitalized "azure" 2020-02-11 15:23:34 -08:00
030bc3a9e4 remove incorrect info and add note about expected behavior
https://github.com/MicrosoftDocs/windows-itpro-docs/issues/5432
2020-01-22 10:38:32 +02:00
229b88c69e Update windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com>
2019-10-22 09:02:28 +01:00
44ebc6107b Update enroll-a-windows-10-device-automatically-using-group-policy.md
Device credential automatic enrollment isnt supported by Intune. Added a note to call this out.
2019-10-21 14:33:10 -07:00
a2d920d7e7 Merge branch 'public' into patch-4 2019-10-09 09:29:42 +01:00
d8e924255b Merge branch 'public' into master 2019-10-07 13:30:00 -07:00
764463f940 Update windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com>
2019-10-07 18:01:50 +01:00
79e500a391 Update enroll-a-windows-10-device-automatically-using-group-policy.md 2019-10-07 17:43:56 +01:00
909f55ab30 1709 or later
References to 1709 updated (apart from one) to "1709 or later" to be correct
2019-10-07 09:48:14 +01:00
62190b32ae Updated GPO names to match the current version of Windows
Updated GPO name and links to files. Edited instructions to include new options in GPO and removed hyperlinks to older version of ADMX files (1803) and added links to newest version (1903)
2019-10-07 09:45:19 +01:00
22fe43ded8 Update windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com>
2019-10-07 09:28:02 +01:00
93a34f80f4 GPO Names and Behaviour Has Changed
"Enable automatic MDM enrollment using default Azure AD credentials" is the GPO name and it has two sub options. Not sure if Device Certificate is working at the moment, but the pictures are wrong, but User Certificate is working and so the docs should at least say to use that for now
2019-10-04 19:47:30 +01:00
f4f7a401c5 Update windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
- remove redundant parentheses

Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>
2019-10-03 17:40:49 +02:00
c60bdc6e2b Client Management/MDM: 1903 GPO ADMX templates
Description:
Administrative Templates (.admx) for Windows 10 May 2019 Update (1903)
v3.0 has been available since 2019-08-28 and this page needs updating
to reflect this change, as mentioned in issue ticket #5078.

Proposed changes:
- Remove the note saying that Windows 10 version 1903 is still on the
  Insider program and doesn't contain any downloadable templates yet.
- Add version number 1903 and its link to the list (under 1803 & 1809)
- Add folder information for the installed 1903 templates location
- Minor MarkDown space standardization adjustments
- Add missing blank line after one of the headings

issue ticket closure or reference:

Closes #5078
2019-10-02 04:42:03 +02:00
ae1e862cf3 Merge pull request #5009 from ShrCaJesmo/patch-1
Schedule task hidden from standard users
2019-09-30 09:38:30 -07:00
ceded06014 Merge branch 'master' into patch-1 2019-09-26 07:59:24 +02:00
04b493adde Update windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com>
2019-09-24 16:19:11 -04:00
ff603c68e9 Update windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com>
2019-09-24 14:29:18 +02:00
b8e0549a41 Update windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com>
2019-09-24 14:28:57 +02:00
4200f8facf Update windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com>
2019-09-24 10:23:06 +03:00
5c805deafa Update windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com>
2019-09-24 07:36:20 +02:00
88b8d29dc9 Update windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com>
2019-09-24 07:36:04 +02:00
2b2fc828a1 Update windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com>
2019-09-24 07:35:51 +02:00
1ff75c645f Update windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>
2019-09-24 07:31:56 +02:00
5ea63139ec Update windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>
2019-09-24 07:31:31 +02:00
bb0c99218f Update windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>
2019-09-24 07:31:04 +02:00
3cd9c531b7 Schedule task hidden from standard users
Adds note that the scheduled task that triggers GPO enrollment isn't visible to standard users so to confirm the task was created, admin creds should be used
2019-09-23 12:07:52 -04:00
4e043d94e6 updated steps
https://github.com/MicrosoftDocs/windows-itpro-docs/issues/4850
2019-09-23 15:25:43 +03:00
6a036332f0 Update windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>
2019-09-22 07:22:33 +02:00
7ce206a1f3 Update windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
Co-Authored-By: JohanFreelancer9 <48568725+JohanFreelancer9@users.noreply.github.com>
2019-09-22 07:21:25 +02:00
97e872b419 Update enroll-a-windows-10-device-automatically-using-group-policy.md
Removed some language tags from links, and verified that they still work and apply the users own language when visited.
Added more clarification to certain subjects.
2019-09-22 07:14:00 +02:00
8810e7902d Update enroll-a-windows-10-device-automatically-using-group-policy.md 2019-09-22 07:04:10 +02:00
7e81063a53 Update windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com>
2019-09-22 06:56:10 +02:00
bf3926c4a4 Update windows/client-management/mdm/enroll-a-windows-10-device-automatically-using-group-policy.md
Co-Authored-By: Trond B. Krokli <38162891+illfated@users.noreply.github.com>
2019-09-22 06:54:08 +02:00
2b63f3586d Update enroll-a-windows-10-device-automatically-using-group-policy.md
Added the new 1903 ADMX link, and updated the screenshots and texts to reflect new possibilities introduced in the latest ADMX.
2019-09-19 10:10:26 +02:00
3e4b0fdbd3 Corrected the MDM discovery URL
MDM discovery URL should end with discovery.svc
2019-09-12 10:56:51 +02:00
fe1a87868e Merge branch 'master' of https://github.com/MicrosoftDocs/windows-docs-pr into FromPrivateRepo 2019-09-03 10:42:32 -07:00