From 696cdef2d8021b67cb32a74a1e21467bfab7fa71 Mon Sep 17 00:00:00 2001 From: Chris Davis Date: Mon, 4 Nov 2024 11:10:14 -0800 Subject: [PATCH 01/11] Link fixes per build report --- microsoft-365/admin/basic-mobility-security/capabilities.md | 2 +- .../modern-desktop-deployment-and-management-lab.md | 2 +- .../security/top-security-tasks-for-remote-work.md | 2 +- microsoft-365/solutions/apps-assign-step-1.md | 4 +++- microsoft-365/solutions/apps-config-step-2.md | 2 +- .../solutions/collaboration-governance-overview.md | 4 ++-- microsoft-365/solutions/energy-secure-collaboration.md | 6 +++--- 7 files changed, 12 insertions(+), 10 deletions(-) diff --git a/microsoft-365/admin/basic-mobility-security/capabilities.md b/microsoft-365/admin/basic-mobility-security/capabilities.md index 09e59688aa3..ee6c7fcb0bd 100644 --- a/microsoft-365/admin/basic-mobility-security/capabilities.md +++ b/microsoft-365/admin/basic-mobility-security/capabilities.md @@ -125,7 +125,7 @@ The following sections list the policy settings you can use to help secure and m ## Managed email profile option -The following option can block users from accessing their Microsoft 365 email if they’re using a manually created email profile. Users on iOS devices must delete their manually created email profile before they can access their email. After they delete the profile, a new profile is automatically created on the device. For instructions on how end users can get compliant, see [An existing email account was found](/intune-user-help/existing-company-email-account-found). +The following option can block users from accessing their Microsoft 365 email if they’re using a manually created email profile. Users on iOS devices must delete their manually created email profile before they can access their email. After they delete the profile, a new profile is automatically created on the device. For instructions on how end users can get compliant, see [An existing email account was found](/mem/intune/user-help/how-do-i-find-the-serial-number-on-my-device-ios). |Setting name|iOS|Android|Samsung Knox| |---|---|---|---| diff --git a/microsoft-365/enterprise/modern-desktop-deployment-and-management-lab.md b/microsoft-365/enterprise/modern-desktop-deployment-and-management-lab.md index 768f506d5ef..68b0d2ef957 100644 --- a/microsoft-365/enterprise/modern-desktop-deployment-and-management-lab.md +++ b/microsoft-365/enterprise/modern-desktop-deployment-and-management-lab.md @@ -115,7 +115,7 @@ The following sections describe the scenarios supported by the lab guides. - [Desktop Deployment series videos from Microsoft Mechanics](https://www.aka.ms/watchhowtoshift) - [Microsoft Configuration Manager OS Deployment](/mem/configmgr/osd/understand/introduction-to-operating-system-deployment) - [Deployment guide for Microsoft 365 Apps](/deployoffice/deployment-guide-microsoft-365-apps) -- [Getting Started with Intune](/intune/get-started-evaluation) +- [Getting Started with Intune](/mem/intune/fundamentals/what-is-intune) ## Related resources diff --git a/microsoft-365/security/top-security-tasks-for-remote-work.md b/microsoft-365/security/top-security-tasks-for-remote-work.md index d614000840b..19f0f455a06 100644 --- a/microsoft-365/security/top-security-tasks-for-remote-work.md +++ b/microsoft-365/security/top-security-tasks-for-remote-work.md @@ -213,7 +213,7 @@ Recent blog articles on this topic: Training users can save your users and security operations team a lot of time and frustration. Savvy users are less likely to open attachments or click links in questionable email messages, and they're more likely to avoid suspicious websites. -The Harvard Kennedy School [Cybersecurity Campaign Handbook](https://go.microsoft.com/fwlink/?linkid=2015598&clcid=0x409) provides excellent guidance on establishing a strong culture of security awareness within your organization, including training users to identify phishing attacks. +The Harvard Kennedy School [Cybersecurity Campaign Handbook](https://go.microsoft.com/fwlink/p/?linkid=2015598) provides excellent guidance on establishing a strong culture of security awareness within your organization, including training users to identify phishing attacks. Microsoft 365 provides the following resources to help inform users in your organization: diff --git a/microsoft-365/solutions/apps-assign-step-1.md b/microsoft-365/solutions/apps-assign-step-1.md index 861cd949d10..fb997ecff4d 100644 --- a/microsoft-365/solutions/apps-assign-step-1.md +++ b/microsoft-365/solutions/apps-assign-step-1.md @@ -48,6 +48,7 @@ If you haven't already added users to your Intune tenant, you can add them using ## Add users to Intune As part of setting up Intune, you may have already added users to your Intune tenant. If not, you can add either mulitple users or single users. Adding a user to Intune creates a new Microsoft Entra ID account. + - [Add multiple users to Intune](#add-multiple-users-to-intune) - [Add a single users to Intune](#add-single-users-to-intune) @@ -56,9 +57,10 @@ As part of setting up Intune, you may have already added users to your Intune te ### Add multiple users to Intune -The most efficient way to add users is in bulk in the Intune admin center. Adding users to your Intune tenant involves creating and uploading a *.csv* file containing the full list of members for your organization. For more information about downloading the *.csv* file, understanding the fields within the *.csv* file, and uploading the *.csv* file, see [Add multiple Intune users in the Microsoft Intune admin center](/intune/fundamentals/users-add#add-multiple-intune-users-in-the-microsoft-intune-admin-center). +The most efficient way to add users is in bulk in the Intune admin center. Adding users to your Intune tenant involves creating and uploading a *.csv* file containing the full list of members for your organization. For more information about downloading the *.csv* file, understanding the fields within the *.csv* file, and uploading the *.csv* file, see [Add multiple Intune users in the Microsoft Intune admin center](/mem/intune/fundamentals/users-add#add-multiple-intune-users-in-the-microsoft-intune-admin-center). Other ways to add users to your tenant include the following methods: + - [Add multiple users from your on-premises Active Directory](/mem/intune/fundamentals/users-add#sync-active-directory-and-add-users-to-intune). - [Invite multiple Microsoft Entra B2B users](/entra/external-id/tutorial-bulk-invite). diff --git a/microsoft-365/solutions/apps-config-step-2.md b/microsoft-365/solutions/apps-config-step-2.md index 084b8b451f9..acfe45d2d09 100644 --- a/microsoft-365/solutions/apps-config-step-2.md +++ b/microsoft-365/solutions/apps-config-step-2.md @@ -47,7 +47,7 @@ Outlook for iOS/iPadOS and Android supports the following configuration scenario - **Data protection settings** > [!IMPORTANT] -> For configuration scenarios that require device enrollment on Android, the devices must be enrolled in Android Enterprise, and Outlook for Android must be deployed via the managed Google Play store. For more information, see [Set up enrollment of Android work profile devices](/intune/android-work-profile-enroll) and [Add app configuration policies for managed Android devices](/intune/app-configuration-policies-use-android). +> For configuration scenarios that require device enrollment on Android, the devices must be enrolled in Android Enterprise, and Outlook for Android must be deployed via the managed Google Play store. For more information, see [Set up enrollment of Android work profile devices](/mem/intune/enrollment/android-work-profile-enroll) and [Add app configuration policies for managed Android devices](/mem/intune/apps/app-configuration-policies-use-android). |Configuration scenario|Description| |---|---| diff --git a/microsoft-365/solutions/collaboration-governance-overview.md b/microsoft-365/solutions/collaboration-governance-overview.md index c640e31dd1b..f35ae2db926 100644 --- a/microsoft-365/solutions/collaboration-governance-overview.md +++ b/microsoft-365/solutions/collaboration-governance-overview.md @@ -197,10 +197,10 @@ This set of illustrations uses one of the most regulated industries, financial s |:-----|:-----| |[![Model poster: Microsoft Purview information protection and compliance capabilities.](../media/solutions-architecture-center/m365-compliance-illustrations-thumb.png)](https://download.microsoft.com/download/3/a/6/3a6ab1a3-feb0-4ee2-8e77-62415a772e53/m365-compliance-illustrations.pdf)
English: [Download as a PDF](https://download.microsoft.com/download/3/a/6/3a6ab1a3-feb0-4ee2-8e77-62415a772e53/m365-compliance-illustrations.pdf) \| [Download as a Visio](https://download.microsoft.com/download/3/a/6/3a6ab1a3-feb0-4ee2-8e77-62415a772e53/m365-compliance-illustrations.vsdx)
Japanese: [Download as a PDF](https://download.microsoft.com/download/6/f/1/6f1a7d0e-dd8e-442e-b073-8e94327ae4f8/m365-compliance-illustrations.pdf) \| [Download as a Visio](https://download.microsoft.com/download/6/f/1/6f1a7d0e-dd8e-442e-b073-8e94327ae4f8/m365-compliance-illustrations.vsdx)
Updated November 2020|Includes: