You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/devices/assign-local-admin.md
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: devices
8
8
ms.topic: how-to
9
-
ms.date: 02/08/2022
9
+
ms.date: 02/15/2022
10
10
11
11
ms.author: joflore
12
12
author: MicrosoftGuyJFlo
@@ -71,7 +71,7 @@ Currently, there's no UI in Intune to manage these policies and they need to be
71
71
72
72
- Adding Azure AD groups through the policy requires the group's SID that can be obtained by executing the [Microsoft Graph API for Groups](/graph/api/resources/group). The SID is defined by the property `securityIdentifier` in the API response.
73
73
74
-
- Administrator privileges using this policy are evaluated only for the following well-known groups on a Windows 10 device - Administrators, Users, Guests, Power Users, Remote Desktop Users and Remote Management Users.
74
+
- Administrator privileges using this policy are evaluated only for the following well-known groups on a Windows 10 or newer device - Administrators, Users, Guests, Power Users, Remote Desktop Users and Remote Management Users.
75
75
76
76
- Managing local administrators using Azure AD groups isn't applicable to Hybrid Azure AD joined or Azure AD Registered devices.
Copy file name to clipboardExpand all lines: articles/active-directory/devices/azuread-join-sso.md
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -41,7 +41,7 @@ If you have a hybrid environment, with both Azure AD and on-premises AD, it's li
41
41
> [!NOTE]
42
42
> Windows Hello for Business requires additional configuration to enable on-premises SSO from an Azure AD joined device. For more information, see [Configure Azure AD joined devices for On-premises Single-Sign On using Windows Hello for Business](/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-base).
43
43
>
44
-
> FIDO2 security key based passwordless authentication with Windows 10 requires additional configuration to enable on-premises SSO from an Azure AD joined device. For more information, see [Enable passwordless security key sign-in to on-premises resources with Azure Active Directory](../authentication/howto-authentication-passwordless-security-key-on-premises.md).
44
+
> FIDO2 security key based passwordless authentication with Windows 10 or newer requires additional configuration to enable on-premises SSO from an Azure AD joined device. For more information, see [Enable passwordless security key sign-in to on-premises resources with Azure Active Directory](../authentication/howto-authentication-passwordless-security-key-on-premises.md).
45
45
46
46
During an access attempt to a resource requesting Kerberos or NTLM in the user's on-premises environment, the device:
47
47
@@ -57,7 +57,7 @@ With SSO, on an Azure AD joined device you can:
57
57
- Access a UNC path on an AD member server
58
58
- Access an AD member web server configured for Windows-integrated security
59
59
60
-
If you want to manage your on-premises AD from a Windows device, install the [Remote Server Administration Tools for Windows 10](https://www.microsoft.com/download/details.aspx?id=45520).
60
+
If you want to manage your on-premises AD from a Windows device, install the [Remote Server Administration Tools](https://www.microsoft.com/download/details.aspx?id=45520).
Copy file name to clipboardExpand all lines: articles/active-directory/devices/azureadjoin-plan.md
+6-6Lines changed: 6 additions & 6 deletions
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: devices
8
8
ms.topic: how-to
9
-
ms.date: 01/20/2022
9
+
ms.date: 02/15/2022
10
10
11
11
ms.author: joflore
12
12
author: MicrosoftGuyJFlo
@@ -79,7 +79,7 @@ If your identity provider doesn't support these protocols, Azure AD join doesn't
79
79
80
80
You can't use smartcards or certificate-based authentication to join devices to Azure AD. However, smartcards can be used to sign in to Azure AD joined devices if you have AD FS configured.
81
81
82
-
**Recommendation:** Implement Windows Hello for Business for strong, password-less authentication to Windows 10 and above devices.
82
+
**Recommendation:** Implement Windows Hello for Business for strong, password-less authentication to Windows 10 or newer.
83
83
84
84
### User configuration
85
85
@@ -102,11 +102,11 @@ Azure AD join:
102
102
- Isn't supported on previous versions of Windows or other operating systems. If you have Windows 7/8.1 devices, you must upgrade at least to Windows 10 to deploy Azure AD join.
103
103
- Is supported for FIPS-compliant TPM 2.0 but not supported for TPM 1.2. If your devices have FIPS-compliant TPM 1.2, you must disable them before proceeding with Azure AD join. Microsoft doesn't provide any tools for disabling FIPS mode for TPMs as it is dependent on the TPM manufacturer. Contact your hardware OEM for support.
104
104
105
-
**Recommendation:** Always use the latest Windows 10 release to take advantage of updated features.
105
+
**Recommendation:** Always use the latest Windows release to take advantage of updated features.
106
106
107
107
### Management platform
108
108
109
-
Device management for Azure AD joined devices is based on an MDM platform such as Intune, and MDM CSPs. Windows 10 has a built-in MDM agent that works with all compatible MDM solutions.
109
+
Device management for Azure AD joined devices is based on an MDM platform such as Intune, and MDM CSPs. Starting in Windows 10 there is a built-in MDM agent that works with all compatible MDM solutions.
110
110
111
111
> [!NOTE]
112
112
> Group policies are not supported in Azure AD joined devices as they are not connected to on-premises Active Directory. Management of Azure AD joined devices is only possible through MDM
@@ -126,7 +126,7 @@ Review supported and unsupported policies to determine whether you can use an MD
126
126
If your MDM solution isn't available through the Azure AD app gallery, you can add it following the process
127
127
outlined in [Azure Active Directory integration with MDM](/windows/client-management/mdm/azure-active-directory-integration-with-mdm).
128
128
129
-
Through co-management, you can use SCCM to manage certain aspects of your devices while policies are delivered through your MDM platform. Microsoft Intune enables co-management with SCCM. For more information on co-management for Windows 10 devices, see [What is co-management?](/configmgr/core/clients/manage/co-management-overview). If you use an MDM product other than Intune, check with your MDM provider on applicable co-management scenarios.
129
+
Through co-management, you can use SCCM to manage certain aspects of your devices while policies are delivered through your MDM platform. Microsoft Intune enables co-management with SCCM. For more information on co-management for Windows 10 or newer devices, see [What is co-management?](/configmgr/core/clients/manage/co-management-overview). If you use an MDM product other than Intune, check with your MDM provider on applicable co-management scenarios.
130
130
131
131
**Recommendation:** Consider MDM only management for Azure AD joined devices.
132
132
@@ -183,7 +183,7 @@ Azure AD joined devices don't support on-premises applications relying on machin
183
183
184
184
Remote desktop connection to an Azure AD joined devices requires the host machine to be either Azure AD joined or hybrid Azure AD joined. Remote desktop from an unjoined or non-Windows device isn't supported. For more information, see [Connect to remote Azure AD joined pc](/windows/client-management/connect-to-remote-aadj-pc)
185
185
186
-
Starting Windows 10 2004 update, users can also use remote desktop from an Azure AD registered Windows 10 device to an Azure AD joined device.
186
+
Starting with the Windows 10 2004 update, users can also use remote desktop from an Azure AD registered Windows 10 or newer device to another Azure AD joined device.
Copy file name to clipboardExpand all lines: articles/active-directory/devices/concept-azure-ad-register.md
+4-4Lines changed: 4 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ services: active-directory
6
6
ms.service: active-directory
7
7
ms.subservice: devices
8
8
ms.topic: conceptual
9
-
ms.date: 01/26/2022
9
+
ms.date: 02/15/2022
10
10
11
11
ms.author: joflore
12
12
author: MicrosoftGuyJFlo
@@ -26,8 +26,8 @@ The goal of Azure AD registered devices is to provide your users with support fo
26
26
|| Bring your own device |
27
27
|| Mobile devices |
28
28
|**Device ownership**| User or Organization |
29
-
|**Operating Systems**| Windows 10 and above, iOS, Android, and macOS |
30
-
|**Provisioning**| Windows 10 and above – Settings |
29
+
|**Operating Systems**| Windows 10 or newer, iOS, Android, and macOS |
30
+
|**Provisioning**| Windows 10 or newer – Settings |
31
31
|| iOS/Android – Company Portal or Microsoft Authenticator app |
32
32
|| macOS – Company Portal |
33
33
|**Device sign in options**| End-user local credentials |
@@ -44,7 +44,7 @@ The goal of Azure AD registered devices is to provide your users with support fo
44
44
45
45

46
46
47
-
Azure AD registered devices are signed in to using a local account like a Microsoft account on a Windows 10 and above device. These devices have an Azure AD account for access to organizational resources. Access to resources in the organization can be limited based on that Azure AD account and Conditional Access policies applied to the device identity.
47
+
Azure AD registered devices are signed in to using a local account like a Microsoft account on a Windows 10 or newer device. These devices have an Azure AD account for access to organizational resources. Access to resources in the organization can be limited based on that Azure AD account and Conditional Access policies applied to the device identity.
48
48
49
49
Administrators can secure and further control these Azure AD registered devices using Mobile Device Management (MDM) tools like Microsoft Intune. MDM provides a means to enforce organization-required configurations like requiring storage to be encrypted, password complexity, and security software kept updated.
0 commit comments