Skip to content

Commit 9ab2465

Browse files
author
Mandi Ohlinger
committed
Merge branch 'main' of https://github.com/MicrosoftDocs/memdocs-pr into ado36009095
2 parents ff256ec + 866c70f commit 9ab2465

227 files changed

Lines changed: 2097 additions & 1586 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

.github/workflows/AutoPublish.yml

Lines changed: 0 additions & 28 deletions
This file was deleted.

.openpublishing.redirection.intune.json

Lines changed: 110 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,115 @@
11
{
22
"redirections": [
3+
{
4+
"source_path": "intune/intune-service/protect/fota-updates-android.md",
5+
"redirect_url": "/intune/device-updates/android/fota-updates",
6+
"redirect_document_id": false
7+
},
8+
{
9+
"source_path": "intune/intune-service/protect/software-update-agent-error-codes.md",
10+
"redirect_url": "/intune/device-updates/windows/software-update-agent-error-codes",
11+
"redirect_document_id": false
12+
},
13+
{
14+
"source_path": "intune/intune-service/protect/software-updates-guide-android.md",
15+
"redirect_url": "/intune/device-updates/android/software-updates-guide",
16+
"redirect_document_id": false
17+
},
18+
{
19+
"source_path": "intune/intune-service/protect/software-updates-guide-personal-byod.md",
20+
"redirect_url": "/intune/device-updates/byod-software-updates-guide",
21+
"redirect_document_id": false
22+
},
23+
{
24+
"source_path": "intune/intune-service/protect/updates/apple.md",
25+
"redirect_url": "/intune/device-updates/apple/index",
26+
"redirect_document_id": false
27+
},
28+
{
29+
"source_path": "intune/intune-service/protect/updates/apple-reports.md",
30+
"redirect_url": "/intune/device-updates/apple/reports",
31+
"redirect_document_id": false
32+
},
33+
{
34+
"source_path": "intune/intune-service/protect/updates/software-updates-guide-ios-ipados.md",
35+
"redirect_url": "/intune/device-updates/apple/software-updates-guide-ios-ipados",
36+
"redirect_document_id": false
37+
},
38+
{
39+
"source_path": "intune/intune-service/protect/updates/software-updates-guide-macos.md",
40+
"redirect_url": "/intune/device-updates/apple/software-updates-guide-macos",
41+
"redirect_document_id": false
42+
},
43+
{
44+
"source_path": "intune/intune-service/protect/updates/software-updates-ios.md",
45+
"redirect_url": "/intune/device-updates/apple/software-updates-ios",
46+
"redirect_document_id": false
47+
},
48+
{
49+
"source_path": "intune/intune-service/protect/updates/software-updates-macos.md",
50+
"redirect_url": "/intune/device-updates/apple/software-updates-macos",
51+
"redirect_document_id": false
52+
},
53+
{
54+
"source_path": "intune/intune-service/protect/windows-10-expedite-updates.md",
55+
"redirect_url": "/intune/device-updates/windows/expedite-updates",
56+
"redirect_document_id": false
57+
},
58+
{
59+
"source_path": "intune/intune-service/protect/windows-10-feature-updates.md",
60+
"redirect_url": "/intune/device-updates/windows/feature-updates",
61+
"redirect_document_id": false
62+
},
63+
{
64+
"source_path": "intune/intune-service/protect/windows-10-update-rings.md",
65+
"redirect_url": "/intune/device-updates/windows/update-rings",
66+
"redirect_document_id": false
67+
},
68+
{
69+
"source_path": "intune/intune-service/protect/windows-driver-updates-overview.md",
70+
"redirect_url": "/intune/device-updates/windows/driver-updates-overview",
71+
"redirect_document_id": false
72+
},
73+
{
74+
"source_path": "intune/intune-service/protect/windows-driver-updates-policy.md",
75+
"redirect_url": "/intune/device-updates/windows/driver-updates-policy",
76+
"redirect_document_id": false
77+
},
78+
{
79+
"source_path": "intune/intune-service/protect/windows-quality-update-policy.md",
80+
"redirect_url": "/intune/device-updates/windows/quality-updates-policy",
81+
"redirect_document_id": false
82+
},
83+
{
84+
"source_path": "intune/intune-service/protect/windows-update-compatibility-reports.md",
85+
"redirect_url": "/intune/device-updates/windows/compatibility-reports",
86+
"redirect_document_id": false
87+
},
88+
{
89+
"source_path": "intune/intune-service/protect/windows-update-for-business-configure.md",
90+
"redirect_url": "/intune/device-updates/windows/configure",
91+
"redirect_document_id": false
92+
},
93+
{
94+
"source_path": "intune/intune-service/protect/windows-update-reports.md",
95+
"redirect_url": "/intune/device-updates/windows/reports",
96+
"redirect_document_id": false
97+
},
98+
{
99+
"source_path": "intune/intune-service/protect/windows-update-rollout-options.md",
100+
"redirect_url": "/intune/device-updates/windows/rollout-options",
101+
"redirect_document_id": false
102+
},
103+
{
104+
"source_path": "intune/intune-service/protect/windows-update-settings.md",
105+
"redirect_url": "/intune/device-updates/windows/settings",
106+
"redirect_document_id": false
107+
},
108+
{
109+
"source_path": "intune/intune-service/protect/zebra-lifeguard-ota-integration.md",
110+
"redirect_url": "/intune/device-updates/android/zebra-lifeguard-ota-integration",
111+
"redirect_document_id": false
112+
},
3113
{
4114
"source_path": "intune/analytics/adoption-score.md",
5115
"redirect_url": "/intune/endpoint-analytics/adoption-score",

autopilot/device-preparation/includes/reporting-monitoring.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -50,6 +50,9 @@ Headings are driven by article context. -->
5050
- **In progress** - Application is currently being installed.
5151
- **Skipped** - Usually indicates that the application was selected in the Windows Autopilot device preparation policy, but wasn't assigned to the device group specified in the Windows Autopilot device preparation policy. It can also mean that the application isn't applicable to the device.
5252
- **Failed** - The application failed to install. Check logs for further details.
53+
54+
> [!Note]
55+
> A [known issue](/autopilot/device-preparation/known-issues#win32-winget-and-enterprise-app-catalog-applications-are-skipped-when-managed-installer-policy-is-enabled-for-the-tenant) causes Win32, Microsoft Store, and Enterprise app catalog apps to be skipped when a managed installer is configured.
5356
5457
1. **Scripts** - Contains information regarding the PowerShell scripts being run during the Windows Autopilot device preparation including the list of scripts being run. Statuses include:
5558

autopilot/device-preparation/whats-new.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ Date updated: *September 9, 2025*
4646
4747
[Monthly security update releases](/windows/deployment/update/release-cycle#monthly-security-update-release), also known as Windows quality updates, are installed during a Windows Autopilot device preparation deployment as part of the Windows out-of-box experience (OOBE). The monthly security update releases are installed after the device preparation page completes. These updates can't be disabled for Windows Autopilot device preparation deployments. Installation of monthly security update releases during OOBE normally adds 20-40 minutes to the provisioning process. Installation of monthly security update releases also might require restarts.
4848
49-
More details regarding automatic installation of monthly security update releases can be found in the article [Install Windows monthly security update releases](/intune/intune-service/enrollment/windows-enrollment-status#install-windows-monthly-security-update-releases). However, this article is in regards to using the Enrollment Status Page (ESP) with Windows Autopilot. Windows Autopilot device preparation doesn't use the ESP, so the **Install Windows quality updates (might restart the device)** setting mentioned in this article isn't applicable to Windows Autopilot device preparation.
49+
More details regarding automatic installation of monthly security update releases can be found in the article [Install Windows monthly security update releases](/intune/intune-service/enrollment/windows-enrollment-status#windows-monthly-security-update-release-details). However, this article is in regards to using the Enrollment Status Page (ESP) with Windows Autopilot. Windows Autopilot device preparation doesn't use the ESP, so the **Install Windows quality updates (might restart the device)** setting mentioned in this article isn't applicable to Windows Autopilot device preparation.
5050
5151
For more information, see [Get ready for Windows quality updates out of the box](https://techcommunity.microsoft.com/blog/windows-itpro-blog/get-ready-for-windows-quality-updates-out-of-the-box/4434498).
5252

autopilot/enrollment-autopilot.md

Lines changed: 11 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -39,26 +39,23 @@ appliesto:
3939

4040
- **Owners**: Select users that own the group. Owners can also delete this group.
4141

42-
- **Dynamic device members**: Select **Add dynamic query** > **Add expression**.
43-
44-
Create rules using Windows Autopilot device attributes. Windows Autopilot devices that meet these rules are automatically added to the group. Creating an expression using non-Windows Autopilot attributes doesn't guarantee that devices included in the group are registered to Windows Autopilot.
42+
- **Dynamic device members**: Select **Add dynamic query** > **Add expression**.
43+
44+
Create rules using Windows Autopilot device attributes. Windows Autopilot devices that meet these rules are automatically added to the group.
45+
46+
> [!NOTE]
47+
>
48+
> You should only create groups using the Autopilot device attributes, which are available only on registered devices. Creating an expression using non-Windows Autopilot attributes doesn't guarantee that devices will be members of the group before provisioning and could result in unexpected configuration during OOBE.
49+
4550

4651
When creating expressions:
47-
48-
- To create a group that includes all of the Windows Autopilot devices, enter: `(device.devicePhysicalIDs -any (_ -startsWith "[ZTDid]"))`.
49-
50-
- Intune's group tag field maps to the `OrderID` attribute on Microsoft Entra devices. To create a group that includes all Windows Autopilot devices with a specific group tag (the Microsoft Entra device `OrderID`), enter: `(device.devicePhysicalIds -any (_ -eq "[OrderID]:179887111881"))`.
51-
52-
- To create a group that includes all the Windows Autopilot devices with a specific Purchase Order ID, enter: `(device.devicePhysicalIds -any (_ -eq "[PurchaseOrderId]:76222342342"))`
53-
52+
- To create a group that includes all of the Windows Autopilot devices, enter: `(device.devicePhysicalIDs -any (_ -startsWith "[ZTDid]"))`.
53+
- Intune's group tag field maps to the `OrderID` attribute on Microsoft Entra devices. To create a group that includes all Windows Autopilot devices with a specific group tag (the Microsoft Entra device `OrderID`), enter: `(device.devicePhysicalIds -any (_ -eq "[OrderID]:179887111881"))`.
54+
- To create a group that includes all the Windows Autopilot devices with a specific Purchase Order ID, enter: `(device.devicePhysicalIds -any (_ -eq "[PurchaseOrderId]:76222342342"))`
5455
**Save** the expressions.
5556

5657
1. Select **Create**.
5758

58-
> [!NOTE]
59-
>
60-
> Anything assigned to these attributes is only assigned if the device is registered with Windows Autopilot.
61-
6259
For a detailed tutorial on creating a device group for each of the Windows Autopilot scenarios using Intune, see the following links:
6360

6461
- [User-driven Microsoft Entra join: Create a device group](tutorial/user-driven/azure-ad-join-device-group.md).

autopilot/includes/intune-connector.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -14,9 +14,7 @@ Headings are driven by article context. -->
1414
The **Intune Connector for Active Directory**, also known as the Offline Domain Join (ODJ) Connector, joins computers to an on-premises domain during the Windows Autopilot process. The connector creates computer objects in a specified Organizational Unit (OU) in Active Directory during the domain join process.
1515

1616
> [!IMPORTANT]
17-
> Starting with Intune 2501, the Intune Connector for Active Directory is updated and improves security by following least-privilege principles using a [Managed Service Account (MSA)](/windows-server/identity/ad-ds/manage/understand-service-accounts#standalone-managed-service-accounts). When you download the connector from Intune, you automatically get the updated version.
18-
>
19-
> The [deprecated legacy connector is still available](https://www.microsoft.com/download/details.aspx?id=105392) and will soon stop accepting enrollment requests. If you still use the legacy connector, update immediately to avoid loss of functionality. For more information, see the [Intune Connector for Active Directory with low-privileged account for Windows Autopilot Hybrid Microsoft Entra join deployments](https://aka.ms/Intune-Connector-blog) blog post.
17+
> The Intune Connector for Active Directory versions older than 6.2501.2000.5 are deprecated and can no longer process enrollment requests. For more information, see the [Intune Connector for Active Directory with low-privileged account for Windows Autopilot Hybrid Microsoft Entra join deployments](https://aka.ms/Intune-Connector-blog) blog post.
2018
>
2119
> To update the connector, you must:
2220
>

0 commit comments

Comments
 (0)