Skip to content

Commit 67431e2

Browse files
authored
Merge pull request #16288 from MicrosoftDocs/main
Publish main to live 10/07/2024, 3:30 PM
2 parents 32a31cf + 8626a62 commit 67431e2

File tree

10 files changed

+37
-10
lines changed

10 files changed

+37
-10
lines changed

memdocs/intune/developer/app-sdk-android-phase1.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -166,8 +166,8 @@ The user is ***not*** required to sign into or even launch the Company Portal ap
166166
> [!NOTE]
167167
> Ensure that your app is compatible with the [Google Play requirements](https://developer.android.com/google/play/requirements/target-sdk).
168168
169-
The SDK fully supports Android API 28 (Android 9.0) through Android API 34 (Android 14).
170-
In order to target Android API 34 (Android 14), you must use Intune App SDK `v10.0.0` or later.
169+
The SDK fully supports Android API 28 (Android 9.0) through Android API 35 (Android 15).
170+
In order to target Android API 35 (Android 15), you must use Intune App SDK `v11.0.0` or later.
171171

172172
APIs 26 through 27 (Android 8.0 - 8.1) are in limited support.
173173
The Company Portal app isn't supported below Android API 26 (Android 8.0).

memdocs/intune/fundamentals/intune-govt-service-description.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: MandiOhlinger
88
ms.author: mandia
99
manager: dougeby
10-
ms.date: 08/01/2024
10+
ms.date: 09/19/2024
1111
ms.topic: article
1212
ms.service: microsoft-intune
1313
ms.suite: ems
@@ -73,6 +73,7 @@ The following features are available and supported in Microsoft GCC High and/or
7373
| --- | --- |
7474
| Standard MDM features | ✅ <br/><br/> You can use app policies, device configuration profiles, compliance policies, and more. |
7575
| Mobile Threat Defense (MTD) | ✅ <br/><br/>Mobile Threat Defense (MTD) connectors for Android and iOS/iPadOS devices with MTD vendors that **also support** the GCC High environment can be used. When you sign in to a GCC High tenant, you see the connectors that are available in these environments. |
76+
| Microsoft Defender for Endpoint security settings management (public preview)| ✅ <br/><br/> On devices onboarded to Defender but not enrolled in Intune, you can use Intune endpoint security policies to manage Defender security settings. For more information on this feature, go to [Defender for Endpoint security settings management](../protect/mde-security-integration.md). |
7677
| Platform support | ✅ <br/><br/> You can use the same operating systems - Android, AOSP, iOS/iPadOS, Linux, macOS, and Windows. <br/><br/>- **Android (AOSP)**: There are some device restrictions. For more information, go to [Supported operating systems and browsers in Intune - AOSP](supported-devices-browsers.md#android). <br/>- **Linux**: Generally available (GA) in February 2024.|
7778
| Remote Help | ✅ <br/><br/> Remote Help is supported in GCC on Android, macOS, and Windows devices. It's not supported in GCC High or DoD.<br/><br/> For more information on this feature, go to [Remote Help in Microsoft Intune](../fundamentals/remote-help.md). |
7879
| Windows Autopilot device preparation | ✅ <br/><br/> Some features are available now, such as user-driven deployments, and some are still [in the planning phase](#in-the-planning-phase). For more information on the recent changes to Windows Autopilot device preparation, go to [Blog: Windows deployment with the next generation of Windows Autopilot](https://techcommunity.microsoft.com/t5/microsoft-intune-blog/windows-deployment-with-the-next-generation-of-windows-autopilot/ba-p/4148169). <br/><br/> To get started with Windows Autopilot device preparation, go to [Windows Autopilot Device Preparation overview](/autopilot/device-preparation/overview). |

memdocs/intune/protect/mde-security-integration.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -70,6 +70,18 @@ When a supported device onboards to Microsoft Defender for Endpoint:
7070

7171
Security settings management isn't yet supported with Government clouds. For more information, see [Feature parity with commercial](/microsoft-365/security/defender-endpoint/gov#feature-parity-with-commercial) in *Microsoft Defender for Endpoint for US Government customers*.
7272

73+
### Government cloud support
74+
75+
As a public preview, the Defender for Endpoint security settings management scenario is supported in the following tenants:
76+
77+
- US Government Community (GCC) High
78+
- Department of Defense (DoD)
79+
80+
For more information, see:
81+
82+
- [Intune US Government service description](../fundamentals/intune-govt-service-description.md)
83+
- [Microsoft Defender for Endpoint for US Government customers](/microsoft-365/security/defender-endpoint/gov)
84+
7385
### Connectivity requirements
7486

7587
Devices must have access to the following endpoint:

windows-365/business-continuity-disaster-recovery.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.assetid:
1919
#ROBOTS:
2020
#audience:
2121

22-
ms.reviewer: docoombs
22+
ms.reviewer: docoombs, olivchen, rkiran
2323
ms.suite: ems
2424
search.appverid: MET150
2525
#ms.tgt_pltfrm:
@@ -29,6 +29,8 @@ ms.collection:
2929
- tier1
3030
---
3131

32+
<!--ms.reviewer review required before publish-->
33+
3234
# Business continuity and disaster recovery overview
3335

3436
Windows 365 provides highly resilient user cloud pcs, including:

windows-365/enterprise/architecture.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.assetid:
1919
#ROBOTS:
2020
#audience:
2121

22-
ms.reviewer: thhickli
22+
ms.reviewer: thhickli, mattsha, rikiran
2323
ms.suite: ems
2424
search.appverid: MET150
2525
#ms.tgt_pltfrm:
@@ -29,6 +29,8 @@ ms.collection:
2929
- tier2
3030
---
3131

32+
<!--ms.reviewer review required before publish-->
33+
3234
# Windows 365 architecture
3335

3436
Windows 365 provides a per-user per-month license model by hosting Cloud PCs on behalf of customers in Microsoft Azure. In this model, there’s no need to consider storage, compute infrastructure architecture, or costs. The Windows 365 architecture also lets you use your existing investments in Azure networking and security. Each Cloud PC is provisioned according to the configuration you define in the Windows 365 section of the Microsoft Intune admin center.

windows-365/enterprise/encryption.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.assetid:
1919
#ROBOTS:
2020
#audience:
2121

22-
ms.reviewer: anbiswas
22+
ms.reviewer: ryclar, pratikshah, saudm, jonshi
2323
ms.suite: ems
2424
search.appverid: MET150
2525
#ms.tgt_pltfrm:
@@ -29,6 +29,8 @@ ms.collection:
2929
- tier2
3030
---
3131

32+
<!--ms.reviewer review required before publish-->
33+
3234
# Data encryption in Windows 365
3335

3436
Windows 365 encrypts data at rest and in transit as explained in this article.

windows-365/enterprise/identity-authentication.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.assetid:
1919
#ROBOTS:
2020
#audience:
2121

22-
ms.reviewer: davidbel
22+
ms.reviewer: davidbel, pratikshah
2323
ms.suite: ems
2424
search.appverid: MET150
2525
#ms.tgt_pltfrm:
@@ -29,6 +29,8 @@ ms.collection:
2929
- tier2
3030
---
3131

32+
<!--ms.reviewer review required before publish-->
33+
3234
# Windows 365 identity and authentication
3335

3436
A Cloud PC user's identity defines which access management services manage that user and Cloud PC. This identity defines:

windows-365/enterprise/privacy-personal-data.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.assetid:
1919
#ROBOTS:
2020
#audience:
2121

22-
ms.reviewer: anbiswas
22+
ms.reviewer: tnevins1, pratikshah
2323
ms.suite: ems
2424
search.appverid: MET150
2525
#ms.tgt_pltfrm:
@@ -30,6 +30,8 @@ ms.collection:
3030
- essentials-privacy
3131
---
3232

33+
<!--ms.reviewer review required before publish-->
34+
3335
# Privacy, customer data, and customer content in Windows 365
3436

3537
Windows 365 is a cloud-based service that lets you provision and manage Cloud PC for your users. You manage the Cloud PCs with the rest of your devices by using Microsoft Intune (Windows 365 Enterprise) or a self-serviced experience (Windows 365 Business). This documentation provides details on data platform and privacy compliance for Windows 365. Unless otherwise specified, the term Windows 365 in this document refers to both Windows 365 Enterprise and the Windows 365 Business. Where the details below differ, each product is called out individually.

windows-365/enterprise/resilience.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.assetid:
1919
#ROBOTS:
2020
#audience:
2121

22-
ms.reviewer: thhickli
22+
ms.reviewer: thhickli, rkiran
2323
ms.suite: ems
2424
search.appverid: MET150
2525
#ms.tgt_pltfrm:
@@ -29,6 +29,8 @@ ms.collection:
2929
- tier2
3030
---
3131

32+
<!--ms.reviewer review required before publish-->
33+
3234
# Windows 365 service resilience
3335

3436
Windows 365 is designed to provide a resilient and reliable service for organizations and end users, connecting to, and using their Cloud PCs.

windows-365/enterprise/security.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ ms.assetid:
1919
#ROBOTS:
2020
#audience:
2121

22-
ms.reviewer: chrimo
22+
ms.reviewer: lakasa, pratikshah, saudm, jonshi
2323
ms.suite: ems
2424
search.appverid:
2525
#ms.tgt_pltfrm:
@@ -30,6 +30,8 @@ ms.collection:
3030
- essentials-security
3131
---
3232

33+
<!--ms.reviewer review required before publish-->
34+
3335
# Windows 365 security
3436

3537
Windows 365 provides an end-to-end connection flow for users to do their work effectively and securely. Windows 365 is built with [Zero Trust](/security/zero-trust/zero-trust-overview) in mind, providing the foundation for you to implement controls to better secure your environment across the 6 pillars of Zero Trust. You can implement Zero Trust controls for the following categories:

0 commit comments

Comments
 (0)