Skip to content

Commit 200e40e

Browse files
Merge pull request #19457 from MicrosoftDocs/main
Auto Publish – main to live - 2026-01-27 23:30 UTC
2 parents 0bb571e + 10df8d2 commit 200e40e

6 files changed

Lines changed: 67 additions & 48 deletions

File tree

intune/intune-service/apps/app-protection-policies-monitor.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,17 +9,18 @@ ms.collection:
99
---
1010

1111
# How to Monitor App Protection Policies
12-
[!INCLUDE [azure_portal](../includes/azure_portal.md)]
1312

1413
You can monitor the status of the app protection policies that you applied to users from the Intune app protection pane in Intune. Additionally, you can find information about the users affected by app protection policies, policy compliance status, and any issues that your users might be experiencing.
1514

1615
App protection data is retained for a minimum of 90 days. Any app instances that checked in to the Intune service within the past 90 days is included in the app protection status report.
1716

18-
> [!NOTE]
19-
> When you delete an app protection policy, scoped admins no longer see app instances associated with that policy. Global admins continue to see the policy name listed as "not available."
17+
## Before you begin
2018

21-
> [!NOTE]
22-
> For iOS 16 and later devices, the **Device Name** value in all app protection reports is a generic device name. For more information, see [Apple Developer documentation](https://developer.apple.com/documentation/uikit/uidevice/1620015-name).
19+
- When you delete an app protection policy, scoped admins no longer see app instances associated with that policy. Global Administrators continue to see the policy name listed as "not available."
20+
21+
[!INCLUDE [global-admin](../includes/global-admin.md)]
22+
23+
- For iOS 16 and later devices, the **Device Name** value in all app protection reports is a generic device name. For more information, see [Apple Developer documentation](https://developer.apple.com/documentation/uikit/uidevice/1620015-name).
2324

2425
## View the **App protection status** report
2526

intune/intune-service/apps/tutorial-configure-slack-enterprise-grid.md

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -38,11 +38,6 @@ Turn on EMM for your Slack Enterprise Grid plan by following [Slack's instructio
3838

3939
Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) as the built-in **[Intune Administrator](/entra/identity/role-based-access-control/permissions-reference#intune-administrator)** Microsoft Entra role.
4040

41-
If you created an Intune Trial subscription, the account that created the subscription is a Microsoft Entra [Global Administrator](/entra/identity/role-based-access-control/permissions-reference#global-administrator).
42-
43-
> [!CAUTION]
44-
> [!INCLUDE [global-admin](../includes/global-admin.md)]
45-
4641
## Set up Slack for EMM on iOS devices
4742

4843
Add the iOS/iPadOS app Slack for EMM to your Intune tenant and create an app configuration policy to enable your organizations' iOS/iPadOS users to access Slack with Intune as an EMM provider.

intune/intune-service/fundamentals/deployment-plan-setup.md

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ The first step when deploying Microsoft Intune is to set up your Intune environm
2121

2222
This article takes you through each step in the process of setting up Microsoft Intune. This article also provides the choices and considerations you need to make when setting up an endpoint-management solution such as Intune.
2323

24-
The purpose of this article is to help you get a better understanding of Intune's supported configurations. After reviewing the article, you should be able to sign up for the Microsoft Intune's free trial, add end users, define user groups, assign licenses to users, and set up the other needed settings to begin using Microsoft Intune. All the steps provided in the article help you to add and manage devices and apps using Intune.
24+
The purpose of this article is to help you get a better understanding of Intune's supported configurations. After reviewing the article, you should be able to sign up for the [Microsoft Intune's free trial](try-intune-overview.md), add end users, define user groups, assign licenses to users, and set up the other needed settings to begin using Microsoft Intune. All the steps provided in the article help you to add and manage devices and apps using Intune.
2525

2626
## Prerequisites
2727

@@ -95,10 +95,7 @@ The people in your organization each need a user account before they can sign in
9595

9696
As an administrator, you can add users individually or in bulk to Intune.
9797

98-
You must be a Microsoft Entra [License Administrator](/entra/identity/role-based-access-control/permissions-reference#license-administrator) or [User Administrator](/entra/identity/role-based-access-control/permissions-reference#user-administrator) to add users to Intune. If you created an Intune Trial subscription, the account that created the subscription is a Microsoft Entra [Global Administrator](/entra/identity/role-based-access-control/permissions-reference#global-administrator).
99-
100-
> [!CAUTION]
101-
> [!INCLUDE [global-admin](../includes/global-admin.md)]
98+
You must be a Microsoft Entra [License Administrator](/entra/identity/role-based-access-control/permissions-reference#license-administrator) or [User Administrator](/entra/identity/role-based-access-control/permissions-reference#user-administrator) to add users to Intune.
10299

103100
## 5 - Create groups in Intune
104101

@@ -120,7 +117,7 @@ For guidance, go to [Microsoft Intune licensing](licenses.md).
120117

121118
✔️ **Get started with assigning licenses to users**
122119

123-
Whether you added users one at a time or all at once, you must assign each user an Intune license before users can enroll their devices in Intune. The Microsoft Intune free trial provides 25 Intune licenses. For a list of licenses, see Licenses that include Intune.
120+
Whether you added users one at a time or all at once, you must assign each user an Intune license before users can enroll their devices in Intune. The [Microsoft Intune's free trial](try-intune-overview.md) provides 25 Intune licenses. For a list of licenses, see Licenses that include Intune.
124121
Give users permission to use Intune. Each user or userless device requires an Intune license to access the service.
125122

126123
For guidance, go to [Assign licenses](licenses-assign.md).

intune/intune-service/fundamentals/intune-endpoints.md

Lines changed: 33 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -354,10 +354,41 @@ Before running the script, ensure you have:
354354

355355
### Usage
356356

357-
Run the script from an Intune-managed device to test connectivity to the Intune network endpoints using Azure Front Door.
357+
Run the script from an Intune-managed device to test connectivity to the Intune network endpoints using Azure Front Door. The script can be run in the context of the logged-on user or as the Local System account (Device context).
358358

359-
Open **PowerShell** and use the following syntax:
359+
#### Script Execution
360360

361+
**Option 1: Run as Current User**
362+
363+
Open **PowerShell** as the current user, navigate to the directory containing the script and run with the following command:
364+
365+
```powershell
366+
.\Test-IntuneAFDConnectivity.ps1
367+
```
368+
369+
**Option 2: Run as System (Device Context)**
370+
371+
To test connectivity as the device itself, use [PsExec](/sysinternals/downloads/psexec) from [Microsoft Sysinternals](/sysinternals/downloads/pstools).
372+
373+
1. Download [PsExec](/sysinternals/downloads/psexec)
374+
375+
1. Open **PowerShell** as an Administrator. Navigate to the directory containing **PsExec**.
376+
377+
3. Run the following command to run the script as SYSTEM:
378+
379+
```powershell
380+
.\psexec.exe -accepteula -i -s powershell.exe
381+
```
382+
383+
1. In the new PowerShell window, navigate to the directory containing the script and run with the following command:
384+
385+
```powershell
386+
.\Test-IntuneAFDConnectivity.ps1
387+
```
388+
389+
### Options and Commands
390+
391+
Use the following options based on your environment:
361392

362393
|Cloud|Command|Notes|
363394
| -------- | -------- | -------- |

0 commit comments

Comments
 (0)