Skip to content

Commit 9b2e693

Browse files
Merge pull request #18705 from MicrosoftDocs/main
[AutoPublish] main to live - 09/18 15:29 PDT | 09/19 03:59 IST
2 parents 0e3efdb + b1e1c9a commit 9b2e693

16 files changed

+120
-113
lines changed

intune/intune-service/configuration/administrative-templates-import-custom.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
# required metadata
33

44
title: Import custom and third-party partner ADMX templates in Microsoft Intune
5-
description: You can add, upload, or import custom and third-party partner ADMX and ADML files in Microsoft Intune. When they're imported, create a device configuration profile and assign the profile to your Windows 10/11 devices.
5+
description: You can add, upload, or import custom and third-party partner ADMX and ADML files in Microsoft Intune. When they're imported, create a device configuration profile and assign the profile to your Windows 10/11 client devices.
66
keywords:
77
author: MandiOhlinger
88
ms.author: mandia
@@ -34,15 +34,14 @@ You can import custom and third-party/partner ADMX and ADML templates into the I
3434

3535
This feature applies to:
3636

37-
- Windows 11
38-
- Windows 10
37+
- Windows
3938

4039
This article shows you how to import custom ADMX and ADML files in the Intune admin center.
4140

4241
> [!TIP]
4342
> The settings catalog has many settings natively built-in to Intune, including Google Chrome. For more information, go to:
4443
>
45-
> - [Use the settings catalog to configure settings on Windows, iOS/iPadOS, and macOS devices](settings-catalog.md)
44+
> - [Use the settings catalog to configure settings](settings-catalog.md)
4645
> - [Common tasks you can complete using the Settings Catalog](settings-catalog-common-features.md)
4746
4847
## What you need to know
@@ -147,7 +146,7 @@ When the import completes, your ADMX templates are shown in the list. You can al
147146
4. Select **Create**.
148147
5. In **Basics**, enter the following properties:
149148

150-
- **Name**: Enter a descriptive name for the profile. Name your profiles so you can easily identify them later. For example, a good profile name is **ADMX: Mozilla Firefox for Windows 10/11 devices**.
149+
- **Name**: Enter a descriptive name for the profile. Name your profiles so you can easily identify them later. For example, a good profile name is **ADMX: Mozilla Firefox for Windows devices**.
151150
- **Description**: Enter a description for the profile. This setting is optional, but recommended.
152151

153152
6. Select **Next**.
@@ -191,4 +190,4 @@ To update existing ADMX files that are imported, you have the following options:
191190

192191
## Related articles
193192

194-
[Use the settings catalog to configure settings on Windows, iOS/iPadOS, and macOS devices](settings-catalog.md)
193+
[Use the settings catalog to configure settings](settings-catalog.md)

intune/intune-service/configuration/administrative-templates-windows.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
# required metadata
33

4-
title: Use ADMX templates on Windows 10/11 devices in Microsoft Intune
4+
title: Use ADMX templates on Windows devices in Microsoft Intune
55
description: Use Administrative templates in Microsoft Intune to create groups of settings for Windows 10/11 client devices. Use these settings in a device configuration profile. You can control Office programs, Microsoft Edge, access OneDrive, use remote desktop, enable Auto-Play, set power management settings, use HTTP printing, control user sign-in, and change the event log size.
66
keywords:
77
author: MandiOhlinger
@@ -31,7 +31,7 @@ ms.collection:
3131
- msec-ai-copilot
3232
---
3333

34-
# Use Windows 10/11 templates to configure group policy settings in Microsoft Intune
34+
# Use Windows templates to configure group policy settings in Microsoft Intune
3535

3636
> [!IMPORTANT]
3737
> Starting with the December 2412 release, you can't create new Administrative Templates policies from the **Templates** > **Administrative Templates** profile type in the Intune admin center. To create ADMX template profiles, use the **[settings catalog](settings-catalog.md)**. For more information on this change, see [Windows device configuration policies migrating to unified settings platform in Intune](https://techcommunity.microsoft.com/t5/intune-customer-success/support-tip-windows-device-configuration-policies-migrating-to/ba-p/4189665).
@@ -43,8 +43,7 @@ ms.collection:
4343

4444
This feature applies to:
4545

46-
- Windows 11
47-
- Windows 10
46+
- Windows
4847

4948
The Intune templates are 100-percent cloud-based, are built in to Intune (no downloading), and don't require any customizations, including using OMA-URI. They offer a straight-forward way to find and configure the settings you want:
5049

@@ -62,7 +61,7 @@ This article describes the steps to create a template for Windows client devices
6261

6362
## Before you begin
6463

65-
- Some of these settings are available starting with Windows 10 version 1709 (RS2/build 15063). Some settings aren't included in all Windows editions. For the best experience, we recommend Windows 10 Enterprise version 1903 (19H1/build 18362) or newer.
64+
- Some settings aren't included in all Windows editions. For the best experience, we recommend using the Windows Enterprise edition.
6665

6766
- The Windows settings use the [Windows policy CSPs](/windows/client-management/mdm/policy-configuration-service-provider#policies-supported-by-group-policy-and-admx-backed-policies). The CSPs work on different editions of Windows, such as Home, Professional, Enterprise, and so on. To see if a CSP works on a specific edition, go to [Windows policy CSPs](/windows/client-management/mdm/policy-configuration-service-provider#policies-supported-by-group-policy-and-admx-backed-policies).
6867

@@ -94,7 +93,7 @@ This article describes the steps to create a template for Windows client devices
9493
4. Select **Create**.
9594
5. In **Basics**, enter the following properties:
9695

97-
- **Name**: Name your profiles so you can easily identify them later. For example, a good profile name is *ADMX: Windows 10/11 admin template that configures xyz settings in Microsoft Edge*.
96+
- **Name**: Name your profiles so you can easily identify them later. For example, a good profile name is **ADMX: Configures xyz settings in Microsoft Edge**.
9897
- **Description**: This setting is optional but recommended.
9998

10099
6. Select **Next**.

intune/intune-service/configuration/bios-configuration.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,8 +40,7 @@ For example, you want to prevent end users from reimaging the device and getting
4040

4141
This feature applies to:
4242

43-
- Windows 11
44-
- Windows 10
43+
- Windows
4544
- Dell devices
4645

4746
This article includes more information on the configuration file and Win32 app, and shows you how to create the **BIOS configuration and other settings** policy in Intune.

intune/intune-service/configuration/custom-profile-hololens.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ Using Windows PowerShell and Microsoft Intune, you can use the WDAC CSP to allow
3636
This feature applies to:
3737

3838
- HoloLens 2 devices running Windows Holographic for Business
39-
- Windows 10/11
39+
- Windows
4040

4141
The WDAC CSP is based on the [Windows Defender Application Control (WDAC) feature](/windows/security/threat-protection/windows-defender-application-control/windows-defender-application-control). You can also [use multiple WDAC policies](/windows/security/threat-protection/windows-defender-application-control/deploy-multiple-windows-defender-application-control-policies).
4242

intune/intune-service/configuration/custom-settings-configure.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ This feature applies to:
3737
- Android device administrator
3838
- iOS/iPadOS
3939
- macOS
40-
- Windows 10/11
40+
- Windows
4141

4242
[!INCLUDE [android_device_administrator_support](../includes/android-device-administrator-support.md)]
4343

@@ -75,7 +75,7 @@ This article shows you how to create a custom device configuration profile in In
7575
- [Android device administrator](custom-settings-android.md)
7676
- [iOS/iPadOS](custom-settings-ios.md)
7777
- [macOS](custom-settings-macos.md)
78-
- [Windows 10/11](custom-settings-windows-10.md)
78+
- [Windows](custom-settings-windows-10.md)
7979
- [Windows Holographic for Business](custom-settings-windows-holographic.md)
8080

8181
8. Select **Next**.

intune/intune-service/configuration/custom-settings-windows-10.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
# required metadata
33

4-
title: Add custom settings for Windows 10/11 devices in Microsoft Intune
4+
title: Add custom settings for Windows devices in Microsoft Intune
55
description: Add or create a custom profile to use the OMA-URI settings for devices running Windows 10/11 client in Microsoft Intune. Use a custom profile to add custom settings.
66
keywords:
77
author: MandiOhlinger
@@ -41,8 +41,7 @@ These settings are added to a device configuration profile in Intune, and then a
4141

4242
This feature applies to:
4343

44-
- Windows 11
45-
- Windows 10
44+
- Windows
4645

4746
Windows client custom profiles use Open Mobile Alliance Uniform Resource Identifier (OMA-URI) settings to configure different features. These settings are typically used by mobile device manufacturers to control features on the device.
4847

intune/intune-service/configuration/custom-settings-windows-holographic.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
# required metadata
33

4-
title: Custom settings - Windows Holographic for Business devices - Microsoft Intune | Microsoft Docs
4+
title: Custom settings - Windows Holographic for Business devices
55
description: Add or create a custom profile to use the OMA-URI settings for devices running Windows Holographic for Business in Microsoft Intune, including Microsoft HoloLens. You can set AllowFastReconnect, AllowVPN, AllowUpdateService, UpdateServiceURL, RequireUpdatesApproval, ApprovedUpdates, and ApplicationLaunchRestrictions policy configuration service provider (CSP) settings.
66
keywords:
77
author: MandiOhlinger
@@ -34,7 +34,7 @@ Using Microsoft Intune, you can add or create custom settings for your Windows H
3434
This article applies to:
3535

3636
- Windows Holographic for Business
37-
- Windows 10/11
37+
- Windows
3838

3939
Windows Holographic for Business custom profiles use Open Mobile Alliance Uniform Resource Identifier (OMA-URI) settings to configure different features. These settings are typically used by mobile device manufacturers to control features on the device.
4040

intune/intune-service/configuration/device-firmware-configuration-interface-windows-settings.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
22
# required metadata
33

4-
title: Device firmware configuration interface settings for Windows 10/11 in Microsoft Intune
5-
description: See a list of all the DFCI profile settings and their descriptions on Windows 10/11 client devices. Use these settings in a configuration profile to control UEFI firmware layer features using Microsoft Intune policy. You can manage the CPU, built-in hardware, and boot options on Windows 10/11 client devices using Microsoft Intune.
4+
title: Device firmware configuration interface settings for Windows devices
5+
description: See a list of all the DFCI profile settings and their descriptions on Windows 10/11 client devices. Use these settings in a configuration profile to control UEFI firmware layer features using Microsoft Intune policy. You can manage the CPU, built-in hardware, and boot options on client devices using Microsoft Intune.
66
keywords:
77
author: MandiOhlinger
88
ms.author: mandia
@@ -34,8 +34,7 @@ This article lists and describes the DFCI profile settings you can control on Wi
3434

3535
These settings apply to:
3636

37-
- Windows 11 on supported UEFI
38-
- Windows 10 RS5 (1809) and later on supported UEFI
37+
- Windows on supported UEFI
3938

4039
These settings are added to a device configuration profile in Intune, and then assigned or deployed to your Windows client devices.
4140

@@ -228,7 +227,7 @@ We recommend you configure the **Radios (Bluetooth, Wi-Fi, NFC, etc.)** category
228227

229228
## Related articles
230229

231-
- For other technical details on each setting and what editions of Windows are supported, go to [Windows 10/11 Policy CSP Reference](/windows/client-management/mdm/policy-configuration-service-provider).
230+
- For other technical details on each setting and what editions of Windows are supported, go to [Windows Policy CSP Reference](/windows/client-management/mdm/policy-configuration-service-provider).
232231

233232
- [Use DFCI profiles on Windows devices in Microsoft Intune](device-firmware-configuration-interface-windows.md).
234233

intune/intune-service/configuration/device-firmware-configuration-interface-windows.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,8 +38,7 @@ In Intune, use this feature to control BIOS settings. Typically, firmware is mor
3838

3939
This feature applies to:
4040

41-
- Windows 11 on supported UEFI
42-
- Windows 10 RS5 (1809) and later on supported UEFI
41+
- Windows on supported UEFI
4342

4443
For example, you use Windows client devices in a secure environment, and want to disable the camera. You can disable the camera at the firmware-layer, so it doesn't matter what the end user does. Reinstalling the OS or wiping the computer won't turn the camera back on. In another example, lock down the boot options to prevent users from booting up another OS, or an older version of Windows that doesn't have the same security features.
4544

intune/intune-service/configuration/device-profile-create.md

Lines changed: 13 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -137,7 +137,7 @@ Each template is a logical group of settings grouped together, like Email, VPN,
137137

138138
---
139139

140-
For example, if you select **Windows 10 and later** for the platform, your options look similar to the following profile:
140+
For example, if you select Windows for the platform, your options look similar to the following profile:
141141

142142
:::image type="content" source="./media/device-profile-create/windows-create-device-profile.png" alt-text="Screenshot that shows how to create a Windows device configuration policy and profile in Microsoft Intune.":::
143143

@@ -151,31 +151,30 @@ For more information about scope tags, and what you can do, go to [Use RBAC and
151151

152152
Applies to:
153153

154-
- Windows 11
155-
- Windows 10
154+
- Windows
156155

157-
Applicability rules allow administrators to target devices in a group that meet specific criteria. For example, you create a device restrictions profile that applies to the **All Windows 10/11 devices** group. And, you only want the profile assigned to devices running Windows Enterprise.
156+
Applicability rules allow administrators to target devices in a group that meet specific criteria. For example, you create a device restrictions profile that applies to the **All Windows devices** group. And, you only want the profile assigned to devices running Windows Enterprise.
158157

159158
To do this task, create an **applicability rule**. These rules are great for the following scenarios:
160159

161-
- You use Windows 10 Education (EDU). At Bellows College, you want to target all Windows 10 EDU devices between RS3 and RS4.
162-
- You want to target all users in Human Resources at Contoso, but only want Windows 10 Professional or Enterprise devices.
160+
- At Bellows College, you want to target all Windows devices running Windows 11, version 24H2.
161+
- You want to target all users in Human Resources at Contoso, but only want Windows Professional or Enterprise devices.
163162

164163
To approach these scenarios, you:
165164

166-
- Create a devices group that includes all devices at Bellows College. In the profile, add an applicability rule so it applies if the OS minimum version is `16299` and the maximum version is `17134`. Assign this profile to the Bellows College devices group.
165+
- Create a devices group that includes all devices at Bellows College. In the profile, add an applicability rule so it applies if the OS minimum version is `10.0.26100` and the maximum version is `10.0.26200`. Assign this profile to the Bellows College devices group.
167166

168167
When the profile is assigned, it applies to devices between the minimum and maximum versions you enter. For devices that aren't between the minimum and maximum versions you enter, their status shows as **Not applicable**.
169168

170-
- Create a users group that includes all users in Human Resources (HR) at Contoso. In the profile, add an applicability rule so it applies to devices running Windows 10 Professional or Enterprise. Assign this profile to the HR users group.
169+
- Create a users group that includes all users in Human Resources (HR) at Contoso. In the profile, add an applicability rule so it applies to devices running Windows Professional or Enterprise. Assign this profile to the HR users group.
171170

172-
When the profile is assigned, it applies to devices running Windows 10 Professional or Enterprise. For devices that aren't running these editions, their status shows as **Not applicable**.
171+
When the profile is assigned, it applies to devices running Windows Professional or Enterprise. For devices that aren't running these editions, their status shows as **Not applicable**.
173172

174-
- If there are two profiles with the exact same settings, then the profile without an applicability rule is applied.
173+
- If there are two profiles with the exact same settings, then the profile without an applicability rule is applied.
175174

176-
For example, ProfileA targets the Windows 10 devices group, enables BitLocker, and doesn't have an applicability rule. ProfileB targets the same Windows 10 devices group, enables BitLocker, and has an applicability rule to only apply the profile to Windows 10 Enterprise.
175+
For example, ProfileA targets the Windows devices group, enables BitLocker, and doesn't have an applicability rule. ProfileB targets the same Windows devices group, enables BitLocker, and has an applicability rule to only apply the profile to the Windows Enterprise edition.
177176

178-
When both profiles are assigned, ProfileA is applied because it doesn't have an applicability rule.
177+
When both profiles are assigned, ProfileA is applied because it doesn't have an applicability rule.
179178

180179
When you assign the profile to the groups, the applicability rules act as a filter, and only target the devices that meet your criteria.
181180

@@ -185,7 +184,7 @@ Use the following steps to create an applicability rule.
185184

186185
1. In your policy, select **Applicability Rules**. You can choose the **Rule**, and **Property**:
187186

188-
:::image type="content" source="./media/device-profile-create/applicability-rules.png" alt-text="Screenshot that shows how to add an applicability rule to a Windows 10 device configuration profile in Microsoft Intune." lightbox="./media/device-profile-create/applicability-rules.png":::
187+
:::image type="content" source="./media/device-profile-create/applicability-rules.png" alt-text="Screenshot that shows how to add an applicability rule to a Windows device configuration profile in Microsoft Intune." lightbox="./media/device-profile-create/applicability-rules.png":::
189188

190189
2. In **Rule**, choose if you want to include or exclude users or groups. Your options:
191190

@@ -218,7 +217,7 @@ When creating profiles, consider the following recommendations:
218217
Some configuration profile examples include:
219218

220219
**Profile name**: OneDrive configuration profile for all Windows users
221-
**Profile description**: OneDrive profile that includes the minimum and base settings for all Windows 10 users. Created by `[email protected]` to prevent users from sharing organizational data to personal OneDrive accounts.
220+
**Profile description**: OneDrive profile that includes the minimum and base settings for all Windows users. Created by `[email protected]` to prevent users from sharing organizational data to personal OneDrive accounts.
222221

223222
**Profile name**: VPN profile for all iOS/iPadOS users
224223
**Profile description**: VPN profile that includes the minimum and base settings for all iOS/iPadOS users to connect to Contoso VPN. Created by `[email protected]` so users automatically authenticate to VPN, instead of prompting users for their username and password.

0 commit comments

Comments
 (0)