Skip to content

Commit 187bc51

Browse files
Learn Build Service GitHub AppLearn Build Service GitHub App
authored andcommitted
Merging changes synced from https://github.com/MicrosoftDocs/memdocs-pr (branch live)
2 parents 497fb7c + 69f29e8 commit 187bc51

12 files changed

+55
-44
lines changed

memdocs/intune/developer/app-sdk-android-phase3.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords: SDK
77
author: Erikre
88
ms.author: erikre
99
manager: dougeby
10-
ms.date: 11/01/2023
10+
ms.date: 10/14/2024
1111
ms.topic: reference
1212
ms.service: microsoft-intune
1313
ms.subservice: developer

memdocs/intune/developer/app-sdk-get-started.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: Erikre
88
ms.author: erikre
99
manager: dougeby
10-
ms.date: 11/14/2023
10+
ms.date: 10/14/2024
1111
ms.topic: reference
1212
ms.service: microsoft-intune
1313
ms.subservice: developer
@@ -51,7 +51,7 @@ You _**do not need**_ to register your app. For internal [line-of-business (LOB)
5151

5252
You _**must**_ first register your app with Microsoft Intune and agree to the registration terms. IT administrators can then apply an app protection policy to the managed app, which will be listed as an [Partner productivity apps](../apps/apps-supported-intune-apps.md#partner-productivity-apps).
5353

54-
Until registration has been finished and confirmed by the Microsoft Intune team, Intune administrators won't have the option to apply app protection policy to your app's deep link. Microsoft will also add your app to its [Microsoft Intune Partners page](https://www.microsoft.com/cloud-platform/microsoft-intune-apps). There, the app's icon will be displayed to show that it supports Intune app protection policies.
54+
Until registration has been finished and confirmed by the Microsoft Intune team, Intune administrators won't have the option to apply app protection policy to your app's deep link. Microsoft will also add your app to its Microsoft Intune Partners page. There, the app's icon will be displayed to show that it supports Intune app protection policies.
5555

5656
### The registration process
5757
To begin the registration process, and if you aren't already working with a Microsoft contact, fill out the [Microsoft Intune App Partner Questionnaire](https://forms.office.com/Pages/ResponsePage.aspx?id=v4j5cvGGr0GRqy180BHbR80SNPjnVA1KsGiZ89UxSdVUMEpZNUFEUzdENENOVEdRMjM5UEpWWjJFVi4u).
@@ -67,7 +67,7 @@ We'll use the email addresses listed in your questionnaire response to reach out
6767

6868
2. After we receive all necessary information from you, we'll send you the Microsoft Intune App Partner Agreement to sign. This agreement describes the terms that your company must accept before it becomes a Microsoft Intune app partner.
6969

70-
3. You'll be notified when your app is successfully registered with the Microsoft Intune service and when your app is featured on the [Microsoft Intune partners](https://www.microsoft.com/cloud-platform/microsoft-intune-apps) site.
70+
3. You'll be notified when your app is successfully registered with the Microsoft Intune service and when your app is featured on the Microsoft Intune partners site.
7171

7272
4. Finally, your app's deep link will be added to the next monthly Intune Service update. For example, if the registration information is finished in July, the deep link will be supported in mid-August.
7373

memdocs/intune/developer/app-sdk-ios-appendix.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: Erikre
88
ms.author: erikre
99
manager: dougeby
10-
ms.date: 11/01/2023
10+
ms.date: 10/14/2024
1111
ms.topic: reference
1212
ms.service: microsoft-intune
1313
ms.subservice: developer
@@ -61,16 +61,16 @@ To do this, the application should make use of the `registeredAccounts:` method.
6161

6262
### How often does the SDK retry enrollments?
6363

64-
The SDK will automatically retry all previously failed enrollments on a 24-hour interval. The SDK does this to ensure that if a user's organization enabled MAM after the user signed in to the application, the user will successfully enroll and receive policies.
64+
The SDK automatically retries all previously failed enrollments on a 24-hour interval. The SDK does this to ensure that if a user's organization enabled MAM after the user signed in to the application, the user will successfully enroll and receive policies.
6565

66-
The SDK will stop retrying when it detects that a user has successfully enrolled the application. This is because only one user can enroll an application at a particular time. If the user is unenrolled, the retries will begin again on the same 24-hour interval.
66+
The SDK stops retrying when it detects that a user has successfully enrolled the application. This is because only one user can enroll an application at a particular time. If the user is unenrolled, the retries begin again on the same 24-hour interval.
6767

6868
### Why does the user need to be deregistered?
6969

70-
The SDK will take these actions in the background periodically:
70+
The SDK takes these actions in the background periodically:
7171

72-
* If the application isn't yet enrolled, it will try to enroll all registered accounts every 24 hours.
73-
* If the application is enrolled, the SDK will check for MAM policy updates every 8 hours.
72+
* If the application isn't yet enrolled, it tries to enroll all registered accounts every 24 hours.
73+
* If the application is enrolled, the SDK checks for MAM policy updates every 8 hours.
7474

7575
Deregistering a user notifies the SDK that the user will no longer use the application, and the SDK can stop any of the periodic events for that user account. It also triggers an app unenroll and selective wipe if necessary.
7676

@@ -80,7 +80,7 @@ This method should be called before the user is signed out of the application.
8080

8181
### Are there any other ways that an application can be unenrolled?
8282

83-
Yes, the IT admin can send a selective wipe command to the application. This will deregister and unenroll the user, and it will wipe the user's data. The SDK automatically handles this scenario and sends a notification via the unenroll delegate method.
83+
Yes, the IT admin can send a selective wipe command to the application. This will deregister and unenroll the user, and it wipes the user's data. The SDK automatically handles this scenario and sends a notification via the unenroll delegate method.
8484

8585
### Is there a sample app that demonstrates how to integrate the SDK?
8686

memdocs/intune/developer/app-sdk-ios-phase1.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: Erikre
88
ms.author: erikre
99
manager: dougeby
10-
ms.date: 11/01/2023
10+
ms.date: 10/14/2024
1111
ms.topic: reference
1212
ms.service: microsoft-intune
1313
ms.subservice: developer

memdocs/intune/developer/app-sdk-ios-phase2.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: Erikre
88
ms.author: erikre
99
manager: dougeby
10-
ms.date: 11/01/2023
10+
ms.date: 10/14/2024
1111
ms.topic: reference
1212
ms.service: microsoft-intune
1313
ms.subservice: developer

memdocs/intune/developer/app-sdk-ios-phase3.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: Erikre
88
ms.author: erikre
99
manager: dougeby
10-
ms.date: 11/01/2023
10+
ms.date: 10/14/2024
1111
ms.topic: reference
1212
ms.service: microsoft-intune
1313
ms.subservice: developer

memdocs/intune/enrollment/device-limit-intune-azure.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ keywords:
88
author: Lenewsad
99
ms.author: lanewsad
1010
manager: dougeby
11-
ms.date: 03/04/2024
11+
ms.date: 10/14/2024
1212
ms.topic: conceptual
1313
ms.service: microsoft-intune
1414
ms.subservice: enrollment
@@ -58,7 +58,8 @@ Intune device limit restrictions don't apply to devices enrolled via:
5858
- Co-management with Configuration Manager
5959
- Automatic enrollment + group policy
6060
- Automatic enrollment + device enrollment manager
61-
- Automatic enrollment + bulk device enrollment
61+
- Automatic enrollment + bulk device enrollment
62+
- Automatic enrollment initiated by user through desktop (for example, when they [connect a work or school account in the Windows Settings app](https://support.microsoft.com/windows/manage-user-accounts-in-windows-104dc19f-6430-4b49-6a2b-e4dbd1dcdf32))
6263
- Windows Autopilot
6364

6465
Devices enrolled via these methods are enrolled automatically or by an Intune admin, not by an employee or student, and are considered shared devices. Instead, you can apply the Microsoft Entra limit, where supported.

memdocs/intune/protect/blackberry-mobile-threat-defense-connector.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ keywords:
88
author: brenduns
99
ms.author: brenduns
1010
manager: dougeby
11-
ms.date: 01/23/2024
11+
ms.date: 10/14/2024
1212
ms.topic: how-to
1313
ms.service: microsoft-intune
1414
ms.subservice: protect
@@ -33,7 +33,7 @@ ms.collection:
3333

3434
# Use BlackBerry Protect Mobile with Intune
3535

36-
Control mobile device access to corporate resources using Conditional Access based on risk assessment conducted by BlackBerry Protect Mobile (powered by Cylance AI), a mobile threat defense (MTD) solution that integrates with Microsoft Intune. Risk is assessed based on telemetry collected from devices running the BlackBerry Protect Mobile app.
36+
You can control mobile device access to corporate resources using Conditional Access based on risk assessment conducted by BlackBerry Protect Mobile (powered by Cylance AI), a mobile threat defense (MTD) solution that integrates with Microsoft Intune. Risk is assessed based on telemetry collected from devices running the BlackBerry Protect Mobile app.
3737

3838
You can configure Conditional Access policies based on a BlackBerry Protect risk assessment, enabled through Intune device compliance policies for enrolled devices. You can set up your policies to allow or block noncompliant devices from accessing corporate resources based on detected threats. For unenrolled devices, you can use app protection policies to enforce a block or selective wipe based on detected threats.
3939

@@ -55,7 +55,7 @@ For more information about how to integrate BlackBerry UES with Microsoft Intune
5555

5656
## How do Intune and the BlackBerry MTD connector help protect your company resources?
5757

58-
The CylancePROTECT app for Android and iOS/iPadOS captures file system, network stack, device, and application telemetry where available, then sends the telemetry data to the Cylance AI Protection cloud service to assess the device's risk for mobile threats.
58+
For Android and iOS/iPadOS, the CylancePROTECT app captures file system, network stack, device, and application telemetry where available, then sends the data to the Cylance AI Protection cloud service to assess the device's risk for mobile threats.
5959

6060
- **Support for enrolled devices** - Intune device compliance policy includes a rule for MTD, which can use risk assessment information from CylancePROTECT (BlackBerry). When the MTD rule is enabled, Intune evaluates device compliance with the policy that you enabled. If the device is found noncompliant, users are blocked access to corporate resources, such as Exchange Online and SharePoint Online. Users also receive guidance from the BlackBerry Protect app installed on their devices to resolve the issue and regain access to corporate resources. To support using BlackBerry Protect with enrolled devices:
6161
- [Add MTD apps to devices](../protect/mtd-apps-ios-app-configuration-policy-add-assign.md)

memdocs/intune/protect/encryption-monitor.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: brenduns
88
ms.author: brenduns
99
manager: dougeby
10-
ms.date: 01/18/2024
10+
ms.date: 10/14/2024
1111
ms.topic: how-to
1212
ms.service: microsoft-intune
1313
ms.subservice: protect
@@ -55,7 +55,7 @@ The encryption report supports reporting on devices that run the following opera
5555

5656
### Report details
5757

58-
The Encryption report pane displays a list of the devices you manage with high-level details about those devices. You can select a device from the list to drill-in and view additional details from the devices [Device encryption status](#device-encryption-status) pane.
58+
The Encryption report pane displays a list of the devices you manage with high-level details about those devices. You can select a device from the list to drill-in and view more details from the devices [Device encryption status](#device-encryption-status) pane.
5959

6060
- **Device name** - The name of the device.
6161
- **OS** – The device platform, such as Windows or macOS.
@@ -76,7 +76,7 @@ The Encryption report pane displays a list of the devices you manage with high
7676

7777
For more information on Windows prerequisites for encryption, see the [BitLocker configuration service provider (CSP)](/windows/client-management/mdm/bitlocker-csp) in the Windows documentation.
7878

79-
- **Not ready**: The device doesn't have full encryption capabilities, but may still support encryption.
79+
- **Not ready**: The device doesn't have full encryption capabilities, but might still support encryption.
8080
- **Not applicable**: There isn't enough information to classify this device.
8181

8282
- **Encryption status** – Whether the OS drive is encrypted.
@@ -166,7 +166,7 @@ When you select a device from the Encryption report, Intune displays the **Devic
166166

167167
- Recovery key backup failed.
168168

169-
*Consider: Check the Event log on device to see why the recovery key backup failed. You may need to run the **manage-bde** command to manually escrow recovery keys.*
169+
*Consider: Check the devices Event log to see why the recovery key backup failed. You might need to run the **manage-bde** command to manually escrow recovery keys.*
170170

171171
- A fixed drive is unprotected.
172172

@@ -178,15 +178,15 @@ When you select a device from the Encryption report, Intune displays the **Devic
178178

179179
- Windows Recovery Environment (WinRE) isn't configured.
180180

181-
*Consider: Need to run command line to configure the WinRE on separate partition; as that was not detected. For more information, see [REAgentC command-line options](/windows-hardware/manufacture/desktop/reagentc-command-line-options).*
181+
*Consider: Need to run command line to configure the WinRE on separate partition; as that wasn't detected. For more information, see [REAgentC command-line options](/windows-hardware/manufacture/desktop/reagentc-command-line-options).*
182182

183183
- A TPM isn't available for BitLocker, either because it isn't present, it's been made unavailable in the Registry, or the OS is on a removable drive.
184184

185-
*Consider: The BitLocker policy applied to this device requires a TPM, but on this device, the BitLocker CSP has detected that the TPM may be disabled at the BIOS level.*
185+
*Consider: The BitLocker policy applied to this device requires a TPM, but on this device, the BitLocker CSP detects that the TPM might be disabled at the BIOS level.*
186186

187187
- The TPM isn't ready for BitLocker.
188188

189-
*Consider: The BitLocker CSP sees that this device has an available TPM, but the TPM may need to be initialized. Consider running **intialize-tpm** on the machine to initialize the TPM.*
189+
*Consider: The BitLocker CSP sees that this device has an available TPM, but the TPM might need to be initialized. Consider running **intialize-tpm** on the machine to initialize the TPM.*
190190

191191
- The network isn't available, which is required for recovery key backup.
192192

@@ -200,7 +200,7 @@ This report can be of use in identifying problems for groups of devices. For exa
200200

201201
## Manage recovery keys
202202

203-
For details on managing recovery keys, see the following in the Intune documentation:
203+
For details on managing recovery keys, see the following Intune documentation:
204204

205205
macOS FileVault:
206206

0 commit comments

Comments
 (0)