From 72744df3a4b3af1b5a2be0d3b374939f693b257b Mon Sep 17 00:00:00 2001 From: Scott Breen <39719539+scottbreenmsft@users.noreply.github.com> Date: Thu, 22 Aug 2024 12:16:45 +1000 Subject: [PATCH 1/8] Update platform-sso-macos.md Updating to include requirement for Entra ID join in device settings. --- memdocs/intune/configuration/platform-sso-macos.md | 1 + 1 file changed, 1 insertion(+) diff --git a/memdocs/intune/configuration/platform-sso-macos.md b/memdocs/intune/configuration/platform-sso-macos.md index f5194008227..7b179458ced 100644 --- a/memdocs/intune/configuration/platform-sso-macos.md +++ b/memdocs/intune/configuration/platform-sso-macos.md @@ -66,6 +66,7 @@ This article shows you how to configure Platform SSO for macOS devices in Intune - Safari - To create the Intune policy, at a minimum, sign in with an account that has the following Intune permissions: - Device Configuration **Read**, **Create**, **Update**, and **Assign** permissions +- Users performing the registration must be allowed to join devices to Entra ID. For more information, see [Configure your device settings](/entra/identity/devices/device-join-plan#configure-your-device-settings). There are some built-in roles that have these permissions, including the **Policy and Profile Manager** Intune RBAC role. For more information on RBAC roles in Intune, go to [Role-based access control (RBAC) with Microsoft Intune](../fundamentals/role-based-access-control.md). From 9369a7d3fe05b81da096b118a0789ba1cbe85faa Mon Sep 17 00:00:00 2001 From: Mandi Ohlinger Date: Tue, 27 Aug 2024 13:33:14 -0400 Subject: [PATCH 2/8] moved bullet --- memdocs/intune/configuration/platform-sso-macos.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/memdocs/intune/configuration/platform-sso-macos.md b/memdocs/intune/configuration/platform-sso-macos.md index 7b179458ced..00fb21003bf 100644 --- a/memdocs/intune/configuration/platform-sso-macos.md +++ b/memdocs/intune/configuration/platform-sso-macos.md @@ -66,10 +66,11 @@ This article shows you how to configure Platform SSO for macOS devices in Intune - Safari - To create the Intune policy, at a minimum, sign in with an account that has the following Intune permissions: - Device Configuration **Read**, **Create**, **Update**, and **Assign** permissions -- Users performing the registration must be allowed to join devices to Entra ID. For more information, see [Configure your device settings](/entra/identity/devices/device-join-plan#configure-your-device-settings). There are some built-in roles that have these permissions, including the **Policy and Profile Manager** Intune RBAC role. For more information on RBAC roles in Intune, go to [Role-based access control (RBAC) with Microsoft Intune](../fundamentals/role-based-access-control.md). +- Users performing the registration must be allowed to join devices to Entra ID. For more information, see [Configure your device settings](/entra/identity/devices/device-join-plan#configure-your-device-settings). + ## Step 1 - Decide the authentication method When you create the platform SSO policy in Intune, you need to decide the authentication method you want to use. From a9e82bc121dc7f5944b39d04fe9968f35905838e Mon Sep 17 00:00:00 2001 From: Hui Gao <114577124+huig2@users.noreply.github.com> Date: Thu, 29 Aug 2024 09:28:25 +1000 Subject: [PATCH 3/8] Learn Editor: Update review-logs-using-azure-monitor.md --- memdocs/intune/fundamentals/review-logs-using-azure-monitor.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/memdocs/intune/fundamentals/review-logs-using-azure-monitor.md b/memdocs/intune/fundamentals/review-logs-using-azure-monitor.md index 02d44487c35..65cae9cf412 100644 --- a/memdocs/intune/fundamentals/review-logs-using-azure-monitor.md +++ b/memdocs/intune/fundamentals/review-logs-using-azure-monitor.md @@ -132,7 +132,7 @@ In the audit log, you can find the following properties and their specific value |---|---|---| | ActivityType | The action that the admin takes. | Create, Delete, Patch, Action, SetReference, RemoveReference, Get, Search | | ActorType | Person taking the action. | Unknown = 0, ItPro, IW, System, Partner, Application, GuestUser | -| Category | The pane where the action took place. | Other = 0, Enrollment = 1, Compliance = 2, DeviceConfiguration = 3, Device = 4, Application = 5, EBookManagement = 6, ConditionalAccess= 7, OnPremiseAccess= 8, Role = 9, SoftwareUpdates =10, DeviceSetupConfiguration = 11, DeviceIntent = 12, DeviceIntentSetting = 13, DeviceSecurity = 14, GroupPolicyAnalytics = 15 | +| Category | The pane where the action took place. | Other = 0, Enrollment = 1, Compliance = 2, DeviceConfiguration = 3, Device = 4, Application = 5, EBookManagement = 6, ConditionalAccess= 7, OnPremiseAccess= 8, Role = 9, SoftwareUpdates =10, DeviceSetupConfiguration = 11, DeviceIntent = 12, DeviceIntentSetting = 13, DeviceSecurity = 14, GroupPolicyAnalytics = 15, RemoteHelp = 17| | ActivityResult | Whether the action is successful or not | Success = 1 | ## Cost considerations From 611d78bb2aedee784a6725a532f0825678d918d6 Mon Sep 17 00:00:00 2001 From: Hui Gao <114577124+huig2@users.noreply.github.com> Date: Mon, 2 Sep 2024 09:29:25 +1000 Subject: [PATCH 4/8] Learn Editor: Update review-logs-using-azure-monitor.md --- memdocs/intune/fundamentals/review-logs-using-azure-monitor.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/memdocs/intune/fundamentals/review-logs-using-azure-monitor.md b/memdocs/intune/fundamentals/review-logs-using-azure-monitor.md index 65cae9cf412..7fec04e51e5 100644 --- a/memdocs/intune/fundamentals/review-logs-using-azure-monitor.md +++ b/memdocs/intune/fundamentals/review-logs-using-azure-monitor.md @@ -132,7 +132,7 @@ In the audit log, you can find the following properties and their specific value |---|---|---| | ActivityType | The action that the admin takes. | Create, Delete, Patch, Action, SetReference, RemoveReference, Get, Search | | ActorType | Person taking the action. | Unknown = 0, ItPro, IW, System, Partner, Application, GuestUser | -| Category | The pane where the action took place. | Other = 0, Enrollment = 1, Compliance = 2, DeviceConfiguration = 3, Device = 4, Application = 5, EBookManagement = 6, ConditionalAccess= 7, OnPremiseAccess= 8, Role = 9, SoftwareUpdates =10, DeviceSetupConfiguration = 11, DeviceIntent = 12, DeviceIntentSetting = 13, DeviceSecurity = 14, GroupPolicyAnalytics = 15, RemoteHelp = 17| +| Category | The pane where the action took place. | Other = 0, Enrollment = 1, Compliance = 2, DeviceConfiguration = 3, Device = 4, Application = 5, EBookManagement = 6, ConditionalAccess= 7, OnPremiseAccess= 8, Role = 9, SoftwareUpdates =10, DeviceSetupConfiguration = 11, DeviceIntent = 12, DeviceIntentSetting = 13, DeviceSecurity = 14, GroupPolicyAnalytics = 15, AssignmentFilter = 16, RemoteHelp = 17, OrganizationalMessage = 18, EndpointPrivilegeMgmt = 19, DeviceInventory = 20| | ActivityResult | Whether the action is successful or not | Success = 1 | ## Cost considerations From 23c184e4f350c33e4e171b22dd09ee9ae6a4c0b2 Mon Sep 17 00:00:00 2001 From: Hui Gao <114577124+huig2@users.noreply.github.com> Date: Mon, 2 Sep 2024 09:29:41 +1000 Subject: [PATCH 5/8] Learn Editor: Update review-logs-using-azure-monitor.md From 4aec9a0599116ec42411364c190e1c32b1d58c90 Mon Sep 17 00:00:00 2001 From: CharlieLinMS <119984924+CharlieLinMS@users.noreply.github.com> Date: Tue, 3 Sep 2024 17:38:30 +0800 Subject: [PATCH 6/8] Copilot Deprecation related change. --- memdocs/intune/apps/manage-microsoft-edge.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/memdocs/intune/apps/manage-microsoft-edge.md b/memdocs/intune/apps/manage-microsoft-edge.md index b52b60b0bba..60e22aa76da 100644 --- a/memdocs/intune/apps/manage-microsoft-edge.md +++ b/memdocs/intune/apps/manage-microsoft-edge.md @@ -496,7 +496,7 @@ When a web page requests to open an external app, users will see a pop-up asking ### Copilot > [!NOTE] -> Copilot is also known as Bing Chat Enterprise. Only Copilot eligible users can use Copilot. For more information, see [Frequently asked questions about Copilot](/copilot/faq) +> As of version 128, Copilot for work or school accounts has been deprecated. Therefore, the following policies will no longer be valid in version 128 Copilot is available on Microsoft Edge for iOS and Android. Users can start Copilot by clicking on Copilot button in bottom bar. From c6e71df9fe942dc226094208a3cad083de193577 Mon Sep 17 00:00:00 2001 From: Mandi Ohlinger Date: Tue, 3 Sep 2024 09:32:32 -0400 Subject: [PATCH 7/8] Added link --- memdocs/intune/configuration/platform-sso-macos.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/memdocs/intune/configuration/platform-sso-macos.md b/memdocs/intune/configuration/platform-sso-macos.md index 00fb21003bf..b7395ea0abf 100644 --- a/memdocs/intune/configuration/platform-sso-macos.md +++ b/memdocs/intune/configuration/platform-sso-macos.md @@ -7,7 +7,7 @@ keywords: author: MandiOhlinger ms.author: mandia manager: dougeby -ms.date: 08/21/2024 +ms.date: 09/03/2024 ms.topic: how-to ms.service: microsoft-intune ms.subservice: configuration @@ -69,7 +69,7 @@ This article shows you how to configure Platform SSO for macOS devices in Intune There are some built-in roles that have these permissions, including the **Policy and Profile Manager** Intune RBAC role. For more information on RBAC roles in Intune, go to [Role-based access control (RBAC) with Microsoft Intune](../fundamentals/role-based-access-control.md). -- Users performing the registration must be allowed to join devices to Entra ID. For more information, see [Configure your device settings](/entra/identity/devices/device-join-plan#configure-your-device-settings). +- In [Step 5 - Register the device](#step-5---register-the-device) (this article), users register their devices. These users must be allowed to join devices to Entra ID. For more information, go to [Configure your device settings](/entra/identity/devices/device-join-plan#configure-your-device-settings). ## Step 1 - Decide the authentication method From 95c93d71614c016ea078b4a85afaf61b760074da Mon Sep 17 00:00:00 2001 From: Mandi Ohlinger Date: Tue, 3 Sep 2024 10:11:03 -0400 Subject: [PATCH 8/8] ms.date --- memdocs/intune/fundamentals/review-logs-using-azure-monitor.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/memdocs/intune/fundamentals/review-logs-using-azure-monitor.md b/memdocs/intune/fundamentals/review-logs-using-azure-monitor.md index 7fec04e51e5..771dd00db7e 100644 --- a/memdocs/intune/fundamentals/review-logs-using-azure-monitor.md +++ b/memdocs/intune/fundamentals/review-logs-using-azure-monitor.md @@ -7,7 +7,7 @@ keywords: author: MandiOhlinger ms.author: mandia manager: dougeby -ms.date: 11/30/2023 +ms.date: 09/03/2024 ms.topic: how-to ms.service: microsoft-intune ms.subservice: fundamentals