You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: memdocs/intune/remote-actions/chrome-enterprise-device-details.md
+8-8Lines changed: 8 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -40,17 +40,17 @@ You can view synced devices in the **Devices** > **All devices** list and throug
40
40
41
41
## Prerequisites
42
42
43
-
To view ChromeOS devices and device details, you must be assigned a role that has read permission for *Chrome Enterprise*.
43
+
To view ChromeOS devices and device details, you must be assigned a role with *read* permission for *Chrome Enterprise*.
44
44
45
45
Devices must be enrolled before you can see them in the admin center. Enrollment for ChromeOS devices is done in the Google Admin center. You can create the connection before or after you enroll devices. For more information, see [Enroll ChromeOS devices](https://support.google.com/chrome/a/answer/1360534) (opens Chrome Enterprise and Education Help).
46
46
47
47
## View ChromeOS devices
48
-
Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) and go to **Devices** > **All devices** to view an aggregated list of all devices in Intune, including those running ChromeOS. The following information is shown for ChromeOS devices:
48
+
Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) and go to **Devices** > **All devices** to view an aggregated list of all devices in Intune, including those running ChromeOS. The following information is shown for ChromeOS devices:
49
49
50
50
***Device name**: Device names for ChromeOS devices appear as `Chrome- {serialNumber}`.
51
51
***Managed by**: ChromeOS devices are managed by **Intune**.
52
52
***Ownership**: ChromeOS devices are always marked as **Corporate**.
53
-
***Compliance**: Compliance policies are not supported with ChromeOS devices in Intune so they'll appear in this column as **Not evaluated**.
53
+
***Compliance**: Compliance policies aren't supported with ChromeOS devices in Intune, so they appear in this column as **Not evaluated**.
54
54
55
55
Select **Filter** to filter the device list by platform. You can also go to the navigation menu and select **ChromeOS** for an exclusive view of ChromeOS devices.
56
56
@@ -78,15 +78,15 @@ You can create dynamic device groups based on a [Google Admin organizational uni
78
78
1. For **Membership type**, select **Dynamic Device**.
79
79
2. Select **Add a dynamic query**.
80
80
3. For **Property**, select **enrollmentProfileName**. Select the **Operator**, depending on how you want the rule to work. For **Value**, enter the name of a Google Admin organizational unit.
81
-
2. Create a scope tag for an Intune RBAC role. The scope tag determines the level of access for the Intune role. When you get to **Assignments**, include the dynamic device group you previously created. For more information, see [Use role-based access (RBAC) and scope tags for distributed IT](../fundamentals/scope-tags.md#to-create-a-scope-tag).
81
+
2. Create a scope tag for an Intune RBAC role. The scope tag determines the level of access for the Intune role. When you get to **Assignments**, include the dynamic device group you previously created. For more information, see [Use role-based access (RBAC) and scope tags for distributed IT](../fundamentals/scope-tags.md#to-create-a-scope-tag).
82
82
83
-
After you save the scope tag, it's applied to every device that's part of the dynamic device group. The organizational unit's information syncs with the *enrollmentProfileName* device object property in Microsoft Entra ID, using the full path format that's shown in [System info](#system-info).
83
+
After you save the scope tag, it applies to every device that's part of the dynamic device group. The organizational unit's information syncs with the *enrollmentProfileName* device object property in Microsoft Entra ID, using the full path format shown in [System info](#system-info).
84
84
85
-
For example: `/OU Level1/OU Level2`.
85
+
For example: `/OU Level1/OU Level2`.
86
86
87
-
The maximum length of the string is 255 characters. Intune truncates the first part of the string if it exceeds the max number of characters.
87
+
The maximum length of the string is 255 characters. Intune truncates the first part of the string if it exceeds the max number of characters.
88
88
89
-
For example: `/OU Level1/OU Level2/.../OU Level18` becomes `evel1/OU Level2/.../OU Level18`.
89
+
For example: `/OU Level1/OU Level2/.../OU Level18` becomes `evel1/OU Level2/.../OU Level18`.
Copy file name to clipboardExpand all lines: memdocs/intune/remote-actions/chrome-enterprise-remote-actions.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -37,20 +37,20 @@ Remotely run device actions on ChromeOS devices synced with Microsoft Intune. Th
37
37
* Wipe
38
38
* Restart (only for kiosk devices and managed guest session devices)
39
39
40
-
To access remote actions, select a device in your **Chrome Enterprise (preview)** list or go to **Devices** > **All devices** and select a device. This article describes the remote actions, and provides information about required permissions and known issues.
40
+
To access remote actions, select a device in your **Chrome Enterprise** list or go to **Devices** > **All devices** and select a device. This article describes the remote actions, and provides information about required permissions and known issues.
41
41
42
42
## Prerequisites
43
-
[Set up the Chrome Enterprise connector](chrome-enterprise-connector-configure.md) with Microsoft Intune, and enroll devices using the Google Admin console.
43
+
[Set up the Chrome Enterprise connector](../enrollment/chrome-enterprise-connector-configure.md) with Microsoft Intune, and enroll devices using the Google Admin console.
44
44
45
45
Permission requirements are provided in the sections that follow.
46
46
47
47
## Deprovision
48
48
Select **Deprovision** to remove Google Admin policies from devices your organization no longer uses. To deprovision a ChromeOS device, you must be assigned a role that has the *Remote tasks: Retire* permission.
49
49
50
-
After you deprovision a device, it remains in the Intune admin center and the Google Admin console. Then on the admin center **System info** page, the device status changes to **DEPROVISIONED**. The device can't be enrolled again until it's restored to factory settings. For more information about the deprovision action, such as how to select the best reason for deprovisioning, see the [Chrome Enterprise and Education Help documentation](https://support.google.com/chrome/a/answer/3523633?).
50
+
After you deprovision a device, it remains in the Intune admin center and the Google Admin console. Then on the admin center **System info** page, the device status changes to **DEPROVISIONED**. The device can't be enrolled again until you restore it to factory settings. For more information about the deprovision action, such as how to select the best reason for deprovisioning, see the [Chrome Enterprise and Education Help documentation](https://support.google.com/chrome/a/answer/3523633?).
51
51
52
52
## Lost mode
53
-
Select **Lost mode** to prevent people from using a ChromeOS device that's lost or stolen. Devices in lost mode display the contact information and message you configured in the Google Admin console. To deprovision a device, you must be assigned a role that has the following permissions:
53
+
Select **Lost mode** to prevent other people from using a lost or stolen ChromeOS device. Devices in lost mode display the contact information and message you configured in the Google Admin console. To deprovision a device, you must be assigned a role that has the following permissions:
54
54
55
55
**Remote tasks: Enable lost mode*
56
56
**Remote tasks: Disable lost mode*
@@ -72,10 +72,10 @@ Select **Restart** to restart a device. To restart a device, you must be assigne
72
72
>[!IMPORTANT]
73
73
> Device users aren't automatically notified of restarts, and might lose unsaved work if you don't tell them about it ahead of time.
74
74
75
-
Restart is only available for kiosk devices and managed guest session devices. The restart will fail on any other type of device. For more information, see [Kiosk apps, managed guest sessions, and smart cards](https://support.google.com/chrome/a/topic/6128720?) (opens Google Chrome Enterprise Help).
75
+
Restart is only available for kiosk devices and managed guest session devices. The restart fails on any other type of device. For more information, see [Kiosk apps, managed guest sessions, and smart cards](https://support.google.com/chrome/a/topic/6128720?) (opens Google Chrome Enterprise Help).
76
76
77
77
## Bulk device actions
78
-
You can issue all of these remote actions as part of a bulk device action. For more information about how to do that, see [Use bulk device actions](../remote-actions/bulk-device-actions.md).
78
+
You can issue all of these remote actions as part of a bulk device action. For more information about how to do that, see [Use bulk device actions](bulk-device-actions.md).
79
79
80
80
## Known issues
81
-
In some cases, device commands remain in a pending state even if they’ve already completed or failed.
81
+
In some cases, device commands remain in a pending state, even if they’ve already completed or failed.
0 commit comments