Skip to content

Commit c878f9e

Browse files
Merge pull request #18946 from MicrosoftDocs/main
[AutoPublish] main to live - 10/15 10:30 PDT | 10/15 23:00 IST
2 parents cb2fce6 + 7448631 commit c878f9e

24 files changed

+320
-182
lines changed

intune/configmgr/develop/adminservice/faq.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -52,12 +52,12 @@ sections:
5252
5353
- Control access to the web service with the certificate trust. If a device doesn't trust the certificate chain, a user on that device can't query the administration service.
5454
55-
- Add additional security layers. For example, [Azure App Proxy](/azure/active-directory/manage-apps/application-proxy).
55+
- Add additional security layers. For example, [Azure App Proxy](/entra/identity/app-proxy/).
5656
5757
- question: |
5858
Can I use it with Conditional Access?
5959
answer: |
60-
Yes, and that configuration is easiest if you use [Azure App Proxy](/azure/active-directory/manage-apps/application-proxy).
60+
Yes, and that configuration is easiest if you use [Azure App Proxy](/entra/identity/app-proxy/).
6161
6262
- name: Miscellaneous
6363
questions:
Lines changed: 63 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,63 @@
1+
---
2+
title: Administration service and CMPivot security update for Microsoft Configuration Manager
3+
titleSuffix: Configuration Manager
4+
description: Administration service and CMPivot security update for Configuration Manager
5+
ms.date: 10/15/2025
6+
ms.subservice: core-infra
7+
ms.service: configuration-manager
8+
ms.topic: reference
9+
ms.assetid: 6749250f-28d3-4abc-90cc-0520b7b11583
10+
author: bhuney
11+
ms.author: brianhun
12+
manager: dougeby
13+
---
14+
15+
# Security updates in administration service and CMPivot for Microsoft Configuration Manager
16+
17+
*Applies to: Configuration Manager (current branch, versions 2403 and 2409)*
18+
19+
## Summary of KB35360093
20+
<!-- 35360093 -->
21+
*Note*
22+
23+
An update is available to resolve an elevation of privilege issue with administration service and CMPivot in Configuration Manager.
24+
This same update is included with [KB32851084](../2503/32851084.md) Update rollup for Microsoft Configuration Manager version 2503.
25+
26+
27+
### Update information for Microsoft Configuration Manager current branch, versions 2403 and 2409
28+
29+
This update is available in the Updates and Servicing node of the Configuration Manager console for version 2403 and 2409 environments with the following updates applied.
30+
- 2403: [KB28204160: Update rollup for Microsoft Configuration Manager version 2403](../2403/28204160.md)
31+
- 2409: [KB30385346: Update rollup for Microsoft Configuration Manager version 2409](../2409/30385346.md)
32+
33+
### Restart information
34+
35+
This update doesn't require a computer restart, but does require a [site reset](../../core/servers/manage/modify-your-infrastructure.md#bkmk_reset) after installation.
36+
37+
### Additional installation information
38+
39+
After you install this update on a primary site, preexisting secondary sites must be manually updated. To update a secondary site in the Configuration Manager console, select **Administration** > **Site Configuration** > **Sites** > **Recover Secondary Site**, and then select the secondary site. The primary site then reinstalls that secondary site by using the updated files. This reinstallation doesn't affect configurations and settings for the secondary site. The new, upgraded, and reinstalled secondary sites under that primary site automatically receive this update.
40+
41+
Run the following SQL Server command on the site database to check whether the update version of a secondary site matches that of its parent primary site:
42+
```sql
43+
select dbo.fnGetSecondarySiteCMUpdateStatus ('SiteCode_of_secondary_site')
44+
```
45+
If the value 1 is returned, the site is up to date, with all the hotfixes applied on its parent primary site.
46+
47+
If the value 0 is returned, all the fixes that are applied to the primary site aren't installed for the secondary site. You should use the **Recover Secondary Site** option to update the secondary site.
48+
49+
## Version information
50+
The Configuration Manager site (setupcore.dll) is updated to the following versions:
51+
- 2403: 5.00.9128.1037
52+
- 2409: 5.00.9132.1031
53+
54+
## File information
55+
File information is available in the following downloadable files.
56+
- 2403: [KB35360093_2403_FileList](https://aka.ms/KB35360093_2403_FileList)
57+
- 2409: [KB35360093_2409_FileList](https://aka.ms/KB35360093_2409_FileList)
58+
59+
## Release history
60+
- October 15, 2025: Initial hotfix release
61+
62+
## References
63+
[Updates and servicing for Configuration Manager](../../core/servers/manage/updates.md)
Lines changed: 104 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,104 @@
1+
---
2+
title: Update rollup for Microsoft Configuration Manager version 2503
3+
titleSuffix: Configuration Manager
4+
description: Update rollup for Configuration Manager 2503
5+
ms.date: 10/15/2025
6+
ms.subservice: core-infra
7+
ms.service: configuration-manager
8+
ms.topic: reference
9+
ms.assetid: 8e0d46ff-66f1-4cd4-9810-acc48881c17a
10+
author: bhuney
11+
ms.author: brianhun
12+
manager: dougeby
13+
---
14+
15+
# Update rollup for Microsoft Configuration Manager version 2503
16+
17+
*Applies to: Configuration Manager (current branch, version 2503)*
18+
19+
## Summary of KB32851084
20+
This article describes issues that are fixed in the update rollup for Microsoft Configuration Manager current branch, version 2503. This update applies both to customers who opted in through a PowerShell script to the early update ring deployment, and customers who installed the globally available release.
21+
22+
For more information on changes in Configuration Manager version 2503, see:
23+
24+
- [What’s new in version 2503 of Configuration Manager current branch](../../core/plan-design/changes/whats-new-in-version-2503.md)
25+
- [Summary of changes in Microsoft Configuration Manager current branch, version 2503](../2503/31909343.md)
26+
27+
## Issues that are fixed
28+
<!-- 34731174 -->
29+
- Microsoft Defender registry keys for the *cloud protection level* and *cloud block timeout* period and are incorrectly removed on co-managed devices.
30+
31+
<!-- 34730905 -->
32+
- The *Check compliance* button returns an error after installing KB 33177653. The error happens in environments where the Cloud Management Azure Service was previously deleted.
33+
34+
<!-- 34870652 -->
35+
- The Microsoft Web Deploy program is updated on cloud management gateway virtual machines from version 3.6 to 4.0.
36+
37+
<!-- 34870625 -->
38+
- Windows Server 2025 updates use the incorrect *Maximum run time* value in the properties for the software update component. The value can lead to update installations being incorrectly canceled.
39+
40+
<!-- 32851851 -->
41+
- The Configuration Manager client is updated to ensure Windows Update scan source policies are set correctly.
42+
43+
<!-- 32525794 -->
44+
- Microsoft Defender policies created in the Intune Portal are incorrectly removed from Windows Servers.
45+
46+
<!-- 33141709 -->
47+
- The SMS Executive Service (smsexec.exe) can terminate unexpectedly when evaluating orchestration groups.
48+
49+
<!-- 33899387 -->
50+
- The count of devices in the *Requirements Not Met* section of deployment status reporting can be incorrect.
51+
52+
<!-- 33899391, 33899393, 33899395 -->
53+
- Deployment status reporting and summarization are updated to more accurately reflect the correct count of success or error conditions.
54+
55+
## Hotfixes that are included in this update
56+
57+
- [KB 33177653](../2503/33177653.md): Azure for US Government update for Configuration Manager 2403, 2409, 2503
58+
- [KB 34503790](../2503/34503790.md): Revised security update for Microsoft Configuration Manager
59+
- [KB 35360093](../2409/35360093.md): CMG security update for Microsoft Configuration Manager
60+
61+
## Update information for Microsoft Configuration Manager current branch, version 2503
62+
63+
This update is available in the Updates and Servicing node of the Configuration Manager console for environments that were installed by using the globally available build of version 2503.
64+
65+
<!-- Members of the Configuration Manager Technology Adoption Program (TAP) must first apply the private TAP rollup before this update is displayed. -->
66+
67+
### Restart information
68+
69+
This update doesn't require a computer restart but will initiate a [site reset](../../core/servers/manage/modify-your-infrastructure.md#bkmk_reset) after installation.
70+
71+
### Additional installation information
72+
73+
After you install this update on a primary site, preexisting secondary sites must be manually updated. To update a secondary site in the Configuration Manager console, select **Administration** > **Site Configuration** > **Sites** > **Recover Secondary Site**, and then select the secondary site. The primary site then reinstalls that secondary site by using the updated files. The reinstallation doesn't affect configurations and settings for the secondary site. The new, upgraded, and reinstalled secondary sites under that primary site automatically receive this update.
74+
75+
Run the following SQL Server command on the site database to check whether the update version of a secondary site matches that of its parent primary site:
76+
77+
```sql
78+
select dbo.fnGetSecondarySiteCMUpdateStatus ('SiteCode_of_secondary_site')
79+
```
80+
81+
If the value 1 is returned, the site is up to date, with all the hotfixes applied on its parent primary site.
82+
83+
If the value 0 is returned, all the fixes that are applied to the primary site aren't installed for the secondary site. You should use the **Recover Secondary Site** option to update the secondary site.
84+
85+
## Version information
86+
87+
The following major components are updated to the versions specified:
88+
89+
| Component | Version |
90+
|---|---|
91+
| Configuration Manager console | 5.2503.1083.1500 |
92+
| Client | 5.0.9135.1013 |
93+
94+
## File information
95+
96+
File information for the release is available in the downloadable [KB32851084_FileList.txt](https://aka.ms/KB32851084_FileList) text file.
97+
98+
## Release history
99+
100+
- September 30, 2025: Initial hotfix release
101+
102+
## References
103+
104+
[Updates and servicing for Configuration Manager](../../core/servers/manage/updates.md)

intune/configmgr/hotfix/2503/33177653.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -21,9 +21,6 @@ manager: dougeby
2121
An update is available to resolve the following issue for Configuration Manager customers using the Azure for US Government cloud environment.
2222
- Co-managed devices in Azure for US Government (Fairfax) fail to correctly retrieve compliance status from Microsoft Intune. This causes them to be marked as noncompliant when checking via Software Center.
2323

24-
<!-- 31986267 -->
25-
- The vulnerability described in [CVE-2025-47178](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-47178) is resolved. Customers can confirm the vulnerability is patched by checking the version of smsprov.dll. A file version of 5.0.9135.1002 or higher indicates the issue is resolved.
26-
2724

2825
### Update information for Microsoft Configuration Manager current branch
2926

intune/configmgr/hotfix/2503/34503790.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,10 @@ manager: dougeby
1919
## Summary of KB34503790
2020
<!-- 34503790 -->
2121
A revised update is available to resolve the vulnerability described in [CVE-2025-47178](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-47178). The revision also improves the security of discovery data records (DDR) processing. CVE-2025-47178 was originally resolved in the globally available release of Configuration Manager version 2503, and in KB 33926600 for versions 2403 and 2409.
22+
The following vulnerabilities are also resolved with this update:
23+
- [CVE-2025-55320](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-55320)
24+
- [CVE-2025-59213](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2025-59213)
25+
2226

2327
KB 34503790 supersedes prior releases of the fix.
2428
Configuration Manager versions 2403 and 2409 display this update under KB 34503768.

intune/configmgr/hotfix/TOC.yml

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,9 @@ items:
1111
href: 2503/33177653.md
1212
- name: KB 34503790 Revised security update for Microsoft Configuration Manager
1313
href: 2503/34503790.md
14+
- name: KB 32851084 Update rollup for version 2503
15+
href: 2503/32851084.md
16+
1417
- name: Version 2409
1518
items:
1619
- name: KB 30195272 Summary of changes in 2409
@@ -25,6 +28,8 @@ items:
2528
href: 2409/33926600.md
2629
- name: KB 34503790 Revised security update for Microsoft Configuration Manager
2730
href: 2503/34503790.md
31+
- name: KB 35360093 Administration service and CMPivot security update for Microsoft Configuration Manager
32+
href: 2409/35360093.md
2833
- name: Version 2403
2934
items:
3035
- name: KB 26186448 Summary of changes in 2403
@@ -41,6 +46,8 @@ items:
4146
href: 2409/33926600.md
4247
- name: KB 34503790 Revised security update for Microsoft Configuration Manager
4348
href: 2503/34503790.md
49+
- name: KB 35360093 Administration service and CMPivot security update for Microsoft Configuration Manager
50+
href: 2409/35360093.md
4451
- name: Version 2309
4552
items:
4653
- name: KB 24341484 Summary of changes in 2309

intune/configmgr/hotfix/index.yml

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,8 @@ landingContent:
2929
url: 2503/33177653.md
3030
- text: KB 34503790 Revised security update for Microsoft Configuration Manager
3131
url: 2503/34503790.md
32+
- text: KB 32851084 Update rollup for Microsoft Configuration Manager version 2503
33+
url: 2503/32851084.md
3234
- title: Configuration Manager 2409
3335
linkLists:
3436
- linkListType: overview
@@ -45,6 +47,8 @@ landingContent:
4547
url: 2409/33926600.md
4648
- text: KB 34503790 Revised security update for Microsoft Configuration Manager
4749
url: 2503/34503790.md
50+
- text: KB 35360093 Administration service and CMPivot security update for Microsoft Configuration Manager
51+
url: 2409/35360093.md
4852
- title: Configuration Manager 2403
4953
linkLists:
5054
- linkListType: overview
@@ -63,6 +67,8 @@ landingContent:
6367
url: 2409/33926600.md
6468
- text: KB 34503790 Revised security update for Microsoft Configuration Manager
6569
url: 2503/34503790.md
70+
- text: KB 35360093 Administration service and CMPivot security update for Microsoft Configuration Manager
71+
url: 2409/35360093.md
6672
- title: Configuration Manager 2309
6773
linkLists:
6874
- linkListType: overview

intune/configmgr/protect/deploy-use/introduction-to-certificate-profiles.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ There are three types of certificate profiles:
5959

6060
## Requirements
6161

62-
To deploy certificate profiles that use SCEP, install the certificate registration point on a site system server. Also install a policy module for NDES, the Configuration Manager Policy Module, on a server that runs Windows Server 2012 R2 or later. This server requires the Active Directory Certificate Services role. It also requires a working NDES that's accessible to the devices that require the certificates. If your devices need to enroll for certificates from the internet, then your NDES server must be accessible from the internet. For example, to safely enable traffic to the NDES server from the internet, you can use [Azure Application Proxy](/azure/active-directory/manage-apps/application-proxy).
62+
To deploy certificate profiles that use SCEP, install the certificate registration point on a site system server. Also install a policy module for NDES, the Configuration Manager Policy Module, on a server that runs Windows Server 2012 R2 or later. This server requires the Active Directory Certificate Services role. It also requires a working NDES that's accessible to the devices that require the certificates. If your devices need to enroll for certificates from the internet, then your NDES server must be accessible from the internet. For example, to safely enable traffic to the NDES server from the internet, you can use [Azure Application Proxy](/entra/identity/app-proxy/).
6363

6464
PFX certificates also require a certificate registration point. Also specify the certificate authority (CA) for the certificate and the relevant access credentials. You can specify either Microsoft or Entrust as certificate authorities.
6565

intune/index.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -228,7 +228,7 @@ additionalContent:
228228
url: /azure/active-directory/
229229
# Card
230230
- title: Windows client docs for IT Pros
231-
summary: Evaluate, plan, deploy, secure, and manage devices running Windows 10 and Windows 11.
231+
summary: Evaluate, plan, deploy, secure, and manage devices running Windows.
232232
url: /windows/resources/
233233
# Card
234234
- title: Windows 365 docs

intune/intune-service/apps/manage-microsoft-edge.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -662,7 +662,7 @@ You can use Microsoft Edge for iOS and Android and [Microsoft Entra application
662662
Before you start:
663663

664664
- Set up your internal applications through Microsoft Entra application proxy.
665-
- To configure Application Proxy and publish applications, see the [setup documentation](/azure/active-directory/manage-apps/application-proxy).
665+
- To configure Application Proxy and publish applications, see the [setup documentation](/entra/identity/app-proxy/).
666666
- Ensure that the user is assigned to the Microsoft Entra application proxy app, even if the app is configured with Passthrough preauthentication type.
667667
- The Microsoft Edge for iOS and Android app must have an [Intune app protection policy](app-protection-policy.md) assigned.
668668
- Microsoft apps must have an app protection policy that has **Restrict web content transfer with other apps** data transfer setting set to **Microsoft Edge**.

0 commit comments

Comments
 (0)