Skip to content

Commit 7758997

Browse files
Merge pull request #18943 from MicrosoftDocs/autoheal-0-20251015055113
[Validation Auto Healing] [Merge by 2025-10-20]
2 parents 50394c9 + 83f20cf commit 7758997

File tree

4 files changed

+5
-5
lines changed

4 files changed

+5
-5
lines changed

intune/configmgr/develop/adminservice/faq.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -52,12 +52,12 @@ sections:
5252
5353
- Control access to the web service with the certificate trust. If a device doesn't trust the certificate chain, a user on that device can't query the administration service.
5454
55-
- Add additional security layers. For example, [Azure App Proxy](/azure/active-directory/manage-apps/application-proxy).
55+
- Add additional security layers. For example, [Azure App Proxy](/entra/identity/app-proxy/).
5656
5757
- question: |
5858
Can I use it with Conditional Access?
5959
answer: |
60-
Yes, and that configuration is easiest if you use [Azure App Proxy](/azure/active-directory/manage-apps/application-proxy).
60+
Yes, and that configuration is easiest if you use [Azure App Proxy](/entra/identity/app-proxy/).
6161
6262
- name: Miscellaneous
6363
questions:

intune/configmgr/protect/deploy-use/introduction-to-certificate-profiles.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ There are three types of certificate profiles:
5959

6060
## Requirements
6161

62-
To deploy certificate profiles that use SCEP, install the certificate registration point on a site system server. Also install a policy module for NDES, the Configuration Manager Policy Module, on a server that runs Windows Server 2012 R2 or later. This server requires the Active Directory Certificate Services role. It also requires a working NDES that's accessible to the devices that require the certificates. If your devices need to enroll for certificates from the internet, then your NDES server must be accessible from the internet. For example, to safely enable traffic to the NDES server from the internet, you can use [Azure Application Proxy](/azure/active-directory/manage-apps/application-proxy).
62+
To deploy certificate profiles that use SCEP, install the certificate registration point on a site system server. Also install a policy module for NDES, the Configuration Manager Policy Module, on a server that runs Windows Server 2012 R2 or later. This server requires the Active Directory Certificate Services role. It also requires a working NDES that's accessible to the devices that require the certificates. If your devices need to enroll for certificates from the internet, then your NDES server must be accessible from the internet. For example, to safely enable traffic to the NDES server from the internet, you can use [Azure Application Proxy](/entra/identity/app-proxy/).
6363

6464
PFX certificates also require a certificate registration point. Also specify the certificate authority (CA) for the certificate and the relevant access credentials. You can specify either Microsoft or Entrust as certificate authorities.
6565

intune/intune-service/apps/manage-microsoft-edge.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -662,7 +662,7 @@ You can use Microsoft Edge for iOS and Android and [Microsoft Entra application
662662
Before you start:
663663

664664
- Set up your internal applications through Microsoft Entra application proxy.
665-
- To configure Application Proxy and publish applications, see the [setup documentation](/azure/active-directory/manage-apps/application-proxy).
665+
- To configure Application Proxy and publish applications, see the [setup documentation](/entra/identity/app-proxy/).
666666
- Ensure that the user is assigned to the Microsoft Entra application proxy app, even if the app is configured with Passthrough preauthentication type.
667667
- The Microsoft Edge for iOS and Android app must have an [Intune app protection policy](app-protection-policy.md) assigned.
668668
- Microsoft apps must have an app protection policy that has **Restrict web content transfer with other apps** data transfer setting set to **Microsoft Edge**.

intune/intune-service/protect/conditional-access-intune-common-ways-use.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ The information in this article can help you understand how to use the Intune mo
2424
2525
## Device-based Conditional Access
2626

27-
Intune and Microsoft Entra ID work together to make sure only managed and compliant devices can access your organization's email, Microsoft 365 services, Software as a service (SaaS) apps, and [on-premises apps](/azure/active-directory/active-directory-application-proxy-get-started). Additionally, you can set a policy in Microsoft Entra ID to only enable domain-joined computers or mobile devices that are enrolled in Intune to access Microsoft 365 services.
27+
Intune and Microsoft Entra ID work together to make sure only managed and compliant devices can access your organization's email, Microsoft 365 services, Software as a service (SaaS) apps, and [on-premises apps](/entra/identity/app-proxy/). Additionally, you can set a policy in Microsoft Entra ID to only enable domain-joined computers or mobile devices that are enrolled in Intune to access Microsoft 365 services.
2828

2929
With Intune, you deploy device compliance policies to determine if a device meets your expected configuration and security requirements. The compliance policy evaluation determines the device's compliance status, which is reported to both Intune and Microsoft Entra ID. It's in Microsoft Entra ID that Conditional Access policies can use a device's compliance status to make decisions on whether to allow or block access to your organization's resources from that device.
3030

0 commit comments

Comments
 (0)