Skip to content

Commit 1f5b57c

Browse files
Merge pull request #18940 from MandiOhlinger/win10
ADO 35568855 - Windows 10 instances in /configuration
2 parents 15cd6b8 + 5edff97 commit 1f5b57c

10 files changed

+37
-49
lines changed

intune/intune-service/configuration/device-profiles.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Device features and settings in Microsoft Intune
33
description: Overview of the different Microsoft Intune device profiles. Get info on GPO, features, restrictions, email, wifi, VPN, education, certificates, upgrade Windows 10/11, BitLocker and Microsoft Defender, and custom device configuration settings in the Microsoft Intune admin center. Use these profiles to manage and protect data and devices in your company.
44
author: MandiOhlinger
55
ms.author: mandia
6-
ms.date: 04/16/2025
6+
ms.date: 10/14/2025
77
ms.topic: overview
88
ms.reviewer: mikedano
99
ms.collection:
@@ -206,13 +206,11 @@ This feature supports:
206206

207207
This feature supports:
208208

209-
- Windows 11 (single app kiosk only)
210-
- Windows 10
209+
- Windows
211210

212-
Kiosk settings also available as device restrictions for [Android](device-restrictions-android.md#kiosk), [Android Enterprise](device-restrictions-android-for-work.md) (Device experience), and [iOS/iPadOS](device-restrictions-ios.md#kiosk).
211+
Windows 11 supports single app kiosk only.
213212

214-
> [!IMPORTANT]
215-
> [!INCLUDE [windows-10-support](../includes/windows-10-support.md)]
213+
Kiosk settings also available as device restrictions for [Android](device-restrictions-android.md#kiosk), [Android Enterprise](device-restrictions-android-for-work.md) (Device experience), and [iOS/iPadOS](device-restrictions-ios.md#kiosk).
216214

217215
## MX profile (Zebra)
218216

intune/intune-service/configuration/device-restrictions-configure.md

Lines changed: 1 addition & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Restrict devices features using policy in Microsoft Intune
33
description: Add a device configuration profile to restrict features on Android device administrator, Android Enterprise, AOSP, macOS, iOS, iPadOS, and Windows 10/11 client devices in Microsoft Intune.
44
author: MandiOhlinger
55
ms.author: mandia
6-
ms.date: 08/19/2024
6+
ms.date: 10/14/2025
77
ms.topic: how-to
88
ms.reviewer: mikedano
99
ms.collection:
@@ -13,8 +13,6 @@ ms.collection:
1313

1414
# Configure device restriction settings in Microsoft Intune
1515

16-
[!INCLUDE [windows-phone-81-windows-10-mobile-support](../includes/windows-phone-81-windows-10-mobile-support.md)]
17-
1816
[!INCLUDE [android_device_administrator_support](../includes/android-device-administrator-support.md)]
1917

2018
Intune includes device restriction policies that help administrators control Android, iOS/iPadOS, macOS, and Windows devices. These restrictions let you control a wide range of settings and features to protect your organization's resources. For example, admins can:
@@ -52,15 +50,9 @@ This article shows you how to create a device restrictions profile. You can also
5250
- **iOS/iPadOS**
5351
- **macOS**
5452
- **Windows 10 and later**
55-
- **Windows 8.1 and later**
5653

5754
- **Profile type**: Select **Device restrictions**. Or, select **Templates** > **Device restrictions**.
5855

59-
To create a device restrictions profile for Windows Team devices, like Surface Hub, then select **Device restrictions (Windows 10 Team)**.
60-
61-
> [!IMPORTANT]
62-
> [!INCLUDE [windows-10-support](../includes/windows-10-support.md)]
63-
6456
4. Select **Create**.
6557
5. In **Basics**, enter the following properties:
6658

@@ -74,10 +66,7 @@ This article shows you how to create a device restrictions profile. You can also
7466
- [Android](device-restrictions-android-for-work.md)
7567
- [iOS/iPadOS](device-restrictions-ios.md)
7668
- [macOS](device-restrictions-macos.md)
77-
- [Windows 8.1](device-restrictions-windows-8-1.md)
7869
- [Windows](device-restrictions-windows-10.md)
79-
- [Windows 10 Team](device-restrictions-windows-10-teams.md)
80-
- [Windows Holographic for Business](device-restrictions-windows-holographic.md)
8170

8271
8. Select **Next**.
8372
9. In **Scope tags** (optional), assign a tag to filter the profile to specific IT groups, like `US-NC IT Team` or `JohnGlenn_ITDepartment`. For information about scope tags, go to [Use RBAC and scope tags for distributed IT](../fundamentals/scope-tags.md).

intune/intune-service/configuration/device-restrictions-windows-10-teams.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,26 +3,25 @@ title: Surface Hub Windows 10 Team device restrictions in Microsoft Intune
33
description: Add or configure Surface Hub devices settings running Windows 10 Team. Add a wake-up screen, create a maintenance window, use Miracast, and more in Microsoft Intune.
44
author: MandiOhlinger
55
ms.author: mandia
6-
ms.date: 04/15/2024
6+
ms.date: 10/14/2025
77
ms.topic: reference
88
ms.reviewer: mikedano
9+
ROBOTS: NOINDEX, NOFOLLOW
910
ms.collection:
1011
- M365-identity-device-management
1112
---
1213

1314
# Windows 10 Team settings to allow or restrict features on Surface Hub devices using Intune
1415

15-
> [!NOTE]
16-
> [!INCLUDE [not-all-settings-are-documented](../includes/not-all-settings-are-documented.md)]
17-
18-
This article describes some of the Microsoft Intune device restrictions settings that you can configure for Surface Hub devices running [Windows 10 Team](/surface-hub/differences-between-surface-hub-and-windows-10-enterprise).
19-
2016
> [!IMPORTANT]
2117
> [!INCLUDE [windows-10-support](../includes/windows-10-support.md)]
2218
19+
This article describes some of the Microsoft Intune device restrictions settings that you can configure for Surface Hub devices running [Windows 10 Team](/surface-hub/differences-between-surface-hub-and-windows-10-enterprise).
20+
2321
## Before you begin
2422

2523
- Create a [Windows 10 Teams device restrictions configuration profile](device-restrictions-configure.md#create-the-profile).
24+
- [!INCLUDE [not-all-settings-are-documented](../includes/not-all-settings-are-documented.md)]
2625

2726
## Apps and experience
2827

intune/intune-service/configuration/device-restrictions-windows-10.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Device restriction settings for Windows devices in Microsoft Intune
33
description: See a list of all the settings and their descriptions for creating device restrictions on Windows 10/11 client devices. Use these settings in a configuration profile to control screenshots, password requirements, kiosk settings, apps in the store, Microsoft Edge browser, Microsoft Defender, access to the cloud, start menu, and more in Microsoft Intune.
44
author: MandiOhlinger
55
ms.author: mandia
6-
ms.date: 11/16/2023
6+
ms.date: 10/14/2025
77
ms.topic: reference
88
ms.reviewer: mikedano
99
ms.collection:
@@ -202,7 +202,7 @@ These settings use the [EnterpriseCloudPrint policy CSP](/windows/client-managem
202202
- **Gaming**: When set to **Block**, this setting:
203203

204204
- Prevents access to the **Settings** app > **Gaming** area on the device.
205-
- On Windows 11 22H2 and later, it hides the **Settings** app > **System** > **Notifications** area on the device. Specifically, it adds the `ms-settings:quietmomentsgame` page to the [Settings/PageVisibilityList CSP](/windows/client-management/mdm/policy-csp-settings#settings-pagevisibilitylist).
205+
- On Windows 11, it hides the **Settings** app > **System** > **Notifications** area on the device. Specifically, it adds the `ms-settings:quietmomentsgame` page to the [Settings/PageVisibilityList CSP](/windows/client-management/mdm/policy-csp-settings#settings-pagevisibilitylist).
206206

207207
When set to **Not configured** (default), Intune doesn't change or update this setting.
208208

@@ -387,7 +387,7 @@ This device restrictions profile is directly related to the kiosk profile you cr
387387
- **Hide Home button**: Hides the home button
388388
- **Allow users to change home button**: **Yes** lets users change the home button. User changes override any administrator settings to the home button.​ **No** (default) blocks users from changing how the administrator configured the home button.
389389
- **Show First Run Experience page (Mobile only)**: **Yes** (default) shows the first use introduction page in Microsoft Edge. **No** stops the introduction page from showing the first time you run Microsoft Edge. This feature allows enterprises, such as organizations enrolled in zero emissions configurations, to block this page.
390-
- **First Run Experience URL list location** (Windows 10 Mobile only): Enter the URL that points to the XML file containing the first run page URL(s). For example, enter `https://www.contoso.com/sites.xml`.
390+
- **First Run Experience URL list location**: Enter the URL that points to the XML file containing the first run page URL(s). For example, enter `https://www.contoso.com/sites.xml`.
391391

392392
- **Refresh browser after idle time**: Enter the number of idle minutes until the browser is refreshed, from 0-1440 minutes. Default is `5` minutes. When set to `0` (zero), the browser doesn't refresh after being idle.
393393

@@ -662,10 +662,10 @@ For information about recent changes for Windows Telemetry, see [Changes to Wind
662662

663663
- **Share usage data**: Choose the level of diagnostic data that's submitted. Your options:
664664
- **Not configured**: (default): Intune doesn't change or update this setting. No setting is forced. Users choose the level that's submitted. By default, the OS might not share any data.
665-
- **Diagnostic data off**: (Not recommended). Review the *CSP System/AllowTelemetry* for details about this setting.
665+
- **Diagnostic data off**: Not recommended.
666666
- **Required**: Sends basic device information, including quality-related data, app compatibility, and other similar data to keep the device secure and up-to-date.
667-
- **Enhanced (1903 and earlier)**: Additional insights, including how Windows, Windows Server, System Center, and apps are used, how they perform, advanced reliability data, and data from the *Required* level. When this option is deployed to a device that runs Windows 1909 and later, the device is set to *Required*.
668-
- **Optional**: All data necessary to identify and help to fix problems, plus data from the *Required* and *Enhanced* level.
667+
- **Enhanced (1903 and earlier)**: Additional insights, including how Windows, Windows Server, System Center, and apps are used, how they perform, advanced reliability data, and data from the **Required** level. For newer OS versions, the device is set to **Required**.
668+
- **Optional**: All data necessary to identify and help to fix problems, plus data from the **Required** and **Enhanced** level.
669669

670670
[System/AllowTelemetry CSP](/windows/client-management/mdm/policy-csp-system#system-allowtelemetry)
671671

@@ -732,8 +732,7 @@ These settings use the [search policy CSP](/windows/client-management/mdm/policy
732732

733733
These settings use the [start policy CSP](/windows/client-management/mdm/policy-csp-start), which also lists the supported Windows editions.
734734

735-
> [!NOTE]
736-
> Management capabilities to deliver customized Start and Taskbar experiences are currently limited on Windows 11. For more information, see [Supported configuration service provider (CSP) policies for Windows 11 Start menu](/windows/configuration/supported-csp-start-menu-layout-windows).
735+
To learn more about the Windows CSPs available for the Start and Taskbar experiences, see [Supported configuration service provider (CSP) policies for Windows Start menu](/windows/configuration/supported-csp-start-menu-layout-windows).
737736

738737
- **Start menu layout**: Upload an XML file that includes your customizations, including the order the apps are listed, and more. The XML file overrides the default start layout. Users can't change the start menu layout you enter.
739738

intune/intune-service/configuration/esim-device-configuration-download-server.md

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ ms.collection:
1414

1515
The identity of a cellular-enabled device, such as a Windows Connected PC, is typically encapsulated in a device called SIM (Subscriber Identity Module), and packaged as a discrete SIM card. Management of SIM cards for many devices can be costly and time-consuming. Therefore, Windows supports eSIM (embedded Subscriber Identity Module) technology as a digital alternative to discrete SIM cards.
1616

17-
Windows 11 provides more capabilities for the deployment and management of eSIM content using Mobile Device Management (MDM) services, like Microsoft Intune.
17+
Windows provides more capabilities for the deployment and management of eSIM content using Mobile Device Management (MDM) services, like Microsoft Intune.
1818

1919
This feature applies to:
2020

@@ -24,14 +24,11 @@ In Intune, you can bulk activate eSIM codes using the following options:
2424

2525
| Option | Platform support | Description |
2626
| --- | --- | --- |
27-
| **eSIM download server <br/>(this article)** | Windows 11 (**recommended**) <br/><br/> Windows 10 - Use [import activation codes using a CSV file](esim-device-configuration.md). | In a settings catalog policy, add your mobile operator's download server FQDN. The device contacts the download server, authenticates, and receives eSIM connection info. <br/><br/>No individual activation codes needed. |
28-
| **[Import activation codes using a CSV file](esim-device-configuration.md)** | Windows 11 (**supported, but not recommended**) - Use an eSIM download server instead<br/> <br/> Windows 10 <br/>| In an eSIM policy, import one-time-use activation codes. The eSIM hardware uses the activation codes to contact the mobile operator, download the eSIM policy, and configure cellular activation. <br/><br/>Requires individual activation codes. |
27+
| **eSIM download server <br/>(this article)** | :::image type="icon" source="../../media/icons/tables/check.svg" border="false"::: Windows 11 (**recommended**) <br/><br/>:::image type="icon" source="../../media/icons/tables/error.svg" border="false"::: Windows 10 - Use [import activation codes using a CSV file](esim-device-configuration.md). | In a settings catalog policy, add your mobile operator's download server FQDN. The device contacts the download server, authenticates, and receives eSIM connection info. <br/><br/>No individual activation codes needed. |
28+
| **[Import activation codes using a CSV file](esim-device-configuration.md)** | :::image type="icon" source="../../media/icons/tables/check.svg" border="false"::: Windows 11 (**supported, but not recommended**) - Use an eSIM download server instead<br/> <br/>:::image type="icon" source="../../media/icons/tables/check.svg" border="false"::: Windows 10 <br/>| In an eSIM policy, import one-time-use activation codes. The eSIM hardware uses the activation codes to contact the mobile operator, download the eSIM policy, and configure cellular activation. <br/><br/>Requires individual activation codes. |
2929

3030
Using an Intune [settings catalog](settings-catalog.md) policy, you can add eSIM to your supported devices using an eSIM download server. This article gives more information about eSIM, describes the process, lists the prerequisites, and lists the steps to configure eSIM using the settings catalog.
3131

32-
> [!IMPORTANT]
33-
> [!INCLUDE [windows-10-support](../includes/windows-10-support.md)]
34-
3532
## About eSIM technology
3633

3734
eSIM technology created a worldwide ecosystem of cellular devices and mobile operators. It's based on a common specification from the Global System for Mobile Communications Association (GSMA). The adoption of eSIM technology continues to grow due to its incorporation in popular smart phones. Windows supports eSIM for PCs, and has supported eSIM since 2017.
@@ -56,7 +53,10 @@ Within Windows, the [eUICCs Configuration Service Provider (CSP)](/windows/clien
5653

5754
To deploy eSIM to your devices using Intune, you need the following prerequisites:
5855

59-
- **Windows 11** version 22H2 (Build 22621) or higher devices that are enrolled and MDM managed by Intune
56+
- **Windows** devices that are enrolled and MDM managed by Intune. For information on the enrollment options for Windows devices, go to [Windows enrollment guide for Microsoft Intune](../fundamentals/deployment-guide-enrollment-windows.md).
57+
58+
> [!IMPORTANT]
59+
> [!INCLUDE [windows-10-support](../includes/windows-10-support.md)]
6060
6161
- **eSIM capable devices**, like the [Surface Pro 9 with 5G](https://www.microsoft.com/surface/business/surface-pro-9)
6262

@@ -78,6 +78,8 @@ To deploy eSIM to your devices using Intune, you need the following prerequisite
7878

7979
You don't need the individual activation codes.
8080

81+
- [!INCLUDE [minimum-rbac-role-policy-profile-manager](../includes/minimum-rbac-role-policy-profile-manager.md)]
82+
8183
## Process flow
8284

8385
:::image type="content" source="./media/esim-device-configuration/esim-download-server-process.png" alt-text="Process flow for eSIM bulk activation via download server.":::

intune/intune-service/configuration/esim-device-configuration.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -25,8 +25,8 @@ In Intune, you can bulk activate eSIM codes using the following options:
2525

2626
| Option | Platform support | Description |
2727
| --- | --- | --- |
28-
| **Import activation codes using a CSV file <br/> (this article)** | Windows 11 (**supported, but not recommended**) - [Use an eSIM download server](esim-device-configuration-download-server.md) instead<br/> <br/> Windows 10 <br/>| In an eSIM policy, import one-time-use activation codes. The eSIM hardware uses the activation codes to contact the mobile operator, download the eSIM policy, and configure cellular activation. <br/><br/>Requires individual activation codes given to you by the mobile operator. |
29-
| **[eSIM download server](esim-device-configuration-download-server.md)** | Windows 11 (**recommended**) <br/><br/> Windows 10 | In a settings catalog policy, add your mobile operator's download server FQDN. The device contacts the download server, authenticates, and receives eSIM connection info. <br/><br/>No individual activation codes needed. |
28+
| **Import activation codes using a CSV file <br/> (this article)** | :::image type="icon" source="../../media/icons/tables/check.svg" border="false"::: Windows 11 (**supported, but not recommended**) - [Use an eSIM download server](esim-device-configuration-download-server.md) instead<br/> <br/>:::image type="icon" source="../../media/icons/tables/check.svg" border="false"::: Windows 10 <br/>| In an eSIM policy, import one-time-use activation codes. The eSIM hardware uses the activation codes to contact the mobile operator, download the eSIM policy, and configure cellular activation. <br/><br/>Requires individual activation codes given to you by the mobile operator. |
29+
| **[eSIM download server](esim-device-configuration-download-server.md)** | :::image type="icon" source="../../media/icons/tables/check.svg" border="false"::: Windows 11 (**recommended**) <br/><br/>:::image type="icon" source="../../media/icons/tables/error.svg" border="false"::: Windows 10 | In a settings catalog policy, add your mobile operator's download server FQDN. The device contacts the download server, authenticates, and receives eSIM connection info. <br/><br/>No individual activation codes needed. |
3030

3131
This article describes how to import the activation codes in bulk, and then deploy these codes to your eSIM-capable devices. This feature is in [public preview](../fundamentals/public-preview.md).
3232

@@ -35,16 +35,16 @@ This article describes how to import the activation codes in bulk, and then depl
3535
3636
## Prerequisites
3737

38-
To deploy eSIM to your devices using Intune, the following are needed:
38+
To deploy eSIM to your devices using Intune, you need the following prerequisites:
3939

40-
- **eSIM capable devices**, like the Surface LTE. To determine if your Windows device supports eSIM, go to [Use an eSIM to get a cellular data connection on your Windows PC](https://support.microsoft.com/help/4020763/windows-10-use-esim-for-cellular-data). If you're unsure if your devices support eSIM, then you can also contact your device manufacturer.
41-
- A Windows device
40+
- **Windows** devices that are enrolled and MDM managed by Intune. For information on the enrollment options for Windows devices, go to [Windows enrollment guide for Microsoft Intune](../fundamentals/deployment-guide-enrollment-windows.md).
4241

4342
> [!IMPORTANT]
4443
> [!INCLUDE [windows-10-support](../includes/windows-10-support.md)]
4544
45+
- **eSIM capable devices**, like the Surface LTE. To determine if your Windows device supports eSIM, go to [Use an eSIM to get a cellular data connection on your Windows PC](https://support.microsoft.com/help/4020763/windows-10-use-esim-for-cellular-data). If you're unsure if your devices support eSIM, then you can also contact your device manufacturer.
46+
4647
- **Activation codes** provided by your mobile operator. These one time-use activation codes are added to Intune, and deployed to your eSIM capable devices. Contact your mobile operator to acquire eSIM activation codes.
47-
- The device must be enrolled and MDM managed by Intune. For information on the enrollment options for Windows devices, go to [Windows enrollment guide for Microsoft Intune](../fundamentals/deployment-guide-enrollment-windows.md).
4848
- [!INCLUDE [minimum-rbac-role-policy-profile-manager](../includes/minimum-rbac-role-policy-profile-manager.md)]
4949

5050
## Deploy eSIM to devices - overview

0 commit comments

Comments
 (0)