Skip to content
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.

Commit dae93ca

Browse files
committedFeb 15, 2022
[Azure AD] Devices - Bulk update for Windows 11
1 parent 2fe1216 commit dae93ca

24 files changed

+115
-115
lines changed
 

‎articles/active-directory/devices/assign-local-admin.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: devices
88
ms.topic: how-to
9-
ms.date: 02/08/2022
9+
ms.date: 02/15/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -71,7 +71,7 @@ Currently, there's no UI in Intune to manage these policies and they need to be
7171

7272
- Adding Azure AD groups through the policy requires the group's SID that can be obtained by executing the [Microsoft Graph API for Groups](/graph/api/resources/group). The SID is defined by the property `securityIdentifier` in the API response.
7373

74-
- Administrator privileges using this policy are evaluated only for the following well-known groups on a Windows 10 device - Administrators, Users, Guests, Power Users, Remote Desktop Users and Remote Management Users.
74+
- Administrator privileges using this policy are evaluated only for the following well-known groups on a Windows 10 or newer device - Administrators, Users, Guests, Power Users, Remote Desktop Users and Remote Management Users.
7575

7676
- Managing local administrators using Azure AD groups isn't applicable to Hybrid Azure AD joined or Azure AD Registered devices.
7777

‎articles/active-directory/devices/azuread-join-sso.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ If you have a hybrid environment, with both Azure AD and on-premises AD, it's li
4141
> [!NOTE]
4242
> Windows Hello for Business requires additional configuration to enable on-premises SSO from an Azure AD joined device. For more information, see [Configure Azure AD joined devices for On-premises Single-Sign On using Windows Hello for Business](/windows/security/identity-protection/hello-for-business/hello-hybrid-aadj-sso-base).
4343
>
44-
> FIDO2 security key based passwordless authentication with Windows 10 requires additional configuration to enable on-premises SSO from an Azure AD joined device. For more information, see [Enable passwordless security key sign-in to on-premises resources with Azure Active Directory](../authentication/howto-authentication-passwordless-security-key-on-premises.md).
44+
> FIDO2 security key based passwordless authentication with Windows 10 or newer requires additional configuration to enable on-premises SSO from an Azure AD joined device. For more information, see [Enable passwordless security key sign-in to on-premises resources with Azure Active Directory](../authentication/howto-authentication-passwordless-security-key-on-premises.md).
4545
4646
During an access attempt to a resource requesting Kerberos or NTLM in the user's on-premises environment, the device:
4747

@@ -57,7 +57,7 @@ With SSO, on an Azure AD joined device you can:
5757
- Access a UNC path on an AD member server
5858
- Access an AD member web server configured for Windows-integrated security
5959

60-
If you want to manage your on-premises AD from a Windows device, install the [Remote Server Administration Tools for Windows 10](https://www.microsoft.com/download/details.aspx?id=45520).
60+
If you want to manage your on-premises AD from a Windows device, install the [Remote Server Administration Tools](https://www.microsoft.com/download/details.aspx?id=45520).
6161

6262
You can use:
6363

‎articles/active-directory/devices/azureadjoin-plan.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: devices
88
ms.topic: how-to
9-
ms.date: 01/20/2022
9+
ms.date: 02/15/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -79,7 +79,7 @@ If your identity provider doesn't support these protocols, Azure AD join doesn't
7979

8080
You can't use smartcards or certificate-based authentication to join devices to Azure AD. However, smartcards can be used to sign in to Azure AD joined devices if you have AD FS configured.
8181

82-
**Recommendation:** Implement Windows Hello for Business for strong, password-less authentication to Windows 10 and above devices.
82+
**Recommendation:** Implement Windows Hello for Business for strong, password-less authentication to Windows 10 or newer.
8383

8484
### User configuration
8585

@@ -102,11 +102,11 @@ Azure AD join:
102102
- Isn't supported on previous versions of Windows or other operating systems. If you have Windows 7/8.1 devices, you must upgrade at least to Windows 10 to deploy Azure AD join.
103103
- Is supported for FIPS-compliant TPM 2.0 but not supported for TPM 1.2. If your devices have FIPS-compliant TPM 1.2, you must disable them before proceeding with Azure AD join. Microsoft doesn't provide any tools for disabling FIPS mode for TPMs as it is dependent on the TPM manufacturer. Contact your hardware OEM for support.
104104

105-
**Recommendation:** Always use the latest Windows 10 release to take advantage of updated features.
105+
**Recommendation:** Always use the latest Windows release to take advantage of updated features.
106106

107107
### Management platform
108108

109-
Device management for Azure AD joined devices is based on an MDM platform such as Intune, and MDM CSPs. Windows 10 has a built-in MDM agent that works with all compatible MDM solutions.
109+
Device management for Azure AD joined devices is based on an MDM platform such as Intune, and MDM CSPs. Starting in Windows 10 there is a built-in MDM agent that works with all compatible MDM solutions.
110110

111111
> [!NOTE]
112112
> Group policies are not supported in Azure AD joined devices as they are not connected to on-premises Active Directory. Management of Azure AD joined devices is only possible through MDM
@@ -126,7 +126,7 @@ Review supported and unsupported policies to determine whether you can use an MD
126126
If your MDM solution isn't available through the Azure AD app gallery, you can add it following the process
127127
outlined in [Azure Active Directory integration with MDM](/windows/client-management/mdm/azure-active-directory-integration-with-mdm).
128128

129-
Through co-management, you can use SCCM to manage certain aspects of your devices while policies are delivered through your MDM platform. Microsoft Intune enables co-management with SCCM. For more information on co-management for Windows 10 devices, see [What is co-management?](/configmgr/core/clients/manage/co-management-overview). If you use an MDM product other than Intune, check with your MDM provider on applicable co-management scenarios.
129+
Through co-management, you can use SCCM to manage certain aspects of your devices while policies are delivered through your MDM platform. Microsoft Intune enables co-management with SCCM. For more information on co-management for Windows 10 or newer devices, see [What is co-management?](/configmgr/core/clients/manage/co-management-overview). If you use an MDM product other than Intune, check with your MDM provider on applicable co-management scenarios.
130130

131131
**Recommendation:** Consider MDM only management for Azure AD joined devices.
132132

@@ -183,7 +183,7 @@ Azure AD joined devices don't support on-premises applications relying on machin
183183

184184
Remote desktop connection to an Azure AD joined devices requires the host machine to be either Azure AD joined or hybrid Azure AD joined. Remote desktop from an unjoined or non-Windows device isn't supported. For more information, see [Connect to remote Azure AD joined pc](/windows/client-management/connect-to-remote-aadj-pc)
185185

186-
Starting Windows 10 2004 update, users can also use remote desktop from an Azure AD registered Windows 10 device to an Azure AD joined device.
186+
Starting with the Windows 10 2004 update, users can also use remote desktop from an Azure AD registered Windows 10 or newer device to another Azure AD joined device.
187187

188188
### RADIUS and Wi-Fi authentication
189189

‎articles/active-directory/devices/concept-azure-ad-join-hybrid.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: devices
88
ms.topic: conceptual
9-
ms.date: 01/26/2022
9+
ms.date: 02/15/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -27,9 +27,9 @@ Hybrid Azure AD joined devices require network line of sight to your on-premises
2727
| **Primary audience** | Suitable for hybrid organizations with existing on-premises AD infrastructure |
2828
| | Applicable to all users in an organization |
2929
| **Device ownership** | Organization |
30-
| **Operating Systems** | Windows 10 and above, 8.1 and 7 |
30+
| **Operating Systems** | Windows 10 or newer, 8.1 and 7 |
3131
| | Windows Server 2008/R2, 2012/R2, 2016 and 2019 |
32-
| **Provisioning** | Windows 10, Windows Server 2016/2019 |
32+
| **Provisioning** | Windows 10 or newer, Windows Server 2016/2019 |
3333
| | Domain join by IT and autojoin via Azure AD Connect or ADFS config |
3434
| | Domain join by Windows Autopilot and autojoin via Azure AD Connect or ADFS config |
3535
| | Windows 8.1, Windows 7, Windows Server 2012 R2, Windows Server 2012, and Windows Server 2008 R2 - Require MSI |

‎articles/active-directory/devices/concept-azure-ad-register.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: devices
88
ms.topic: conceptual
9-
ms.date: 01/26/2022
9+
ms.date: 02/15/2022
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -26,8 +26,8 @@ The goal of Azure AD registered devices is to provide your users with support fo
2626
| | Bring your own device |
2727
| | Mobile devices |
2828
| **Device ownership** | User or Organization |
29-
| **Operating Systems** | Windows 10 and above, iOS, Android, and macOS |
30-
| **Provisioning** | Windows 10 and above – Settings |
29+
| **Operating Systems** | Windows 10 or newer, iOS, Android, and macOS |
30+
| **Provisioning** | Windows 10 or newer – Settings |
3131
| | iOS/Android – Company Portal or Microsoft Authenticator app |
3232
| | macOS – Company Portal |
3333
| **Device sign in options** | End-user local credentials |
@@ -44,7 +44,7 @@ The goal of Azure AD registered devices is to provide your users with support fo
4444

4545
![Azure AD registered devices](./media/concept-azure-ad-register/azure-ad-registered-device.png)
4646

47-
Azure AD registered devices are signed in to using a local account like a Microsoft account on a Windows 10 and above device. These devices have an Azure AD account for access to organizational resources. Access to resources in the organization can be limited based on that Azure AD account and Conditional Access policies applied to the device identity.
47+
Azure AD registered devices are signed in to using a local account like a Microsoft account on a Windows 10 or newer device. These devices have an Azure AD account for access to organizational resources. Access to resources in the organization can be limited based on that Azure AD account and Conditional Access policies applied to the device identity.
4848

4949
Administrators can secure and further control these Azure AD registered devices using Mobile Device Management (MDM) tools like Microsoft Intune. MDM provides a means to enforce organization-required configurations like requiring storage to be encrypted, password complexity, and security software kept updated.
5050

0 commit comments

Comments
 (0)