Skip to content

Commit

Permalink
Merging changes synced from https://github.com/MicrosoftDocs/Edge-Ent…
Browse files Browse the repository at this point in the history
…erprise-pr (branch live)
  • Loading branch information
Learn Build Service GitHub App authored and Learn Build Service GitHub App committed Nov 8, 2024
2 parents a371b16 + c897070 commit 00fd92f
Show file tree
Hide file tree
Showing 9 changed files with 19 additions and 22 deletions.
12 changes: 6 additions & 6 deletions edgeenterprise/configure-edge-with-intune.md
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ This article explains how to configure Microsoft Edge policy settings for Window

You can configure Microsoft Edge policies and settings by adding a device configuration profile to Microsoft Intune. Using Intune to manage and enforce policies is equivalent to using Active Directory Group Policy or configuring local Group Policy Object (GPO) settings on user devices.

For more information about managing Microsoft Edge policies with Microsoft Intune, you can read [Manage web access by using Microsoft Edge with Microsoft Intune](/intune/manage-microsoft-edge), but keep in mind that the linked article is specific to Microsoft Edge version 45 and earlier and therefore may contain information and references that don't apply to Microsoft Edge Enterprise version 77 and later.
For more information about managing Microsoft Edge policies with Microsoft Intune, you can read [Manage web access by using Microsoft Edge with Microsoft Intune](/mem/intune/apps/manage-microsoft-edge), but keep in mind that the linked article is specific to Microsoft Edge version 45 and earlier and therefore may contain information and references that don't apply to Microsoft Edge Enterprise version 77 and later.

> [!TIP]
> For information on how to configure Microsoft Edge on macOS using Microsoft Intune, see [Configure for macOS](configure-microsoft-edge-on-mac.md).
Expand Down Expand Up @@ -86,7 +86,7 @@ The next screenshot shows the form for the **Basics** tab and the menu bar shows

15. On the **Scope tags** tab, add a Scope tag if wanted, otherwise click the **Next** button.

16. On the **Assignments** tab, click **+ Select groups to include** to assign this policy to the Microsoft Entra group that contains the devices or the users that you want to receive this policy setting. See [Assign user and device profiles in Microsoft Intune](/intune/device-profile-assign) for information about how to assign the profile to your Microsoft Entra user or device groups.
16. On the **Assignments** tab, click **+ Select groups to include** to assign this policy to the Microsoft Entra group that contains the devices or the users that you want to receive this policy setting. See [Assign user and device profiles in Microsoft Intune](/mem/intune/configuration/device-profile-assign) for information about how to assign the profile to your Microsoft Entra user or device groups.

![Select groups to include](./media/configure-edge-with-intune/create-profile-assignments-tab.png)

Expand All @@ -98,11 +98,11 @@ The next screenshot shows the form for the **Basics** tab and the menu bar shows

![Select Microsoft Edge Policy groups to include](./media/configure-edge-with-intune/create-profile-new-policy-finished.png)

For more information about Windows 10 profiles, see [Use Windows 10 templates to configure group policy settings in Microsoft Intune](/intune/administrative-templates-windows).
For more information about Windows 10 profiles, see [Use Windows 10 templates to configure group policy settings in Microsoft Intune](/mem/intune/configuration/administrative-templates-windows).

## See also

- [Microsoft Edge Enterprise landing page](https://aka.ms/EdgeEnterprise)
- [Manage web access by using Microsoft Edge with Microsoft Intune](/intune/manage-microsoft-edge)
- [Use Windows 10 templates to configure group policy settings in Microsoft Intune](/intune/administrative-templates-windows)
- [Deploy Microsoft Edge using Microsoft Intune](/intune/apps/apps-windows-edge/?bc=%2fDeployEdge%2fbreadcrumb%2ftoc.json&toc=%2fDeployEdge%2ftoc.json)
- [Manage web access by using Microsoft Edge with Microsoft Intune](/mem/intune/apps/manage-microsoft-edge)
- [Use Windows 10 templates to configure group policy settings in Microsoft Intune](/mem/intune/configuration/administrative-templates-windows)
- [Deploy Microsoft Edge using Microsoft Intune](/mem/intune/apps/apps-windows-edge/?bc=%2fDeployEdge%2fbreadcrumb%2ftoc.json&toc=%2fDeployEdge%2ftoc.json)
8 changes: 4 additions & 4 deletions edgeenterprise/configure-edge-with-mdm.md
Original file line number Diff line number Diff line change
Expand Up @@ -287,7 +287,7 @@ OMA-URI examples with their URI path, type, and an example value.

## Configure Microsoft Edge in Intune using ADMX ingestion

The recommended way to configure Microsoft Edge with Microsoft Intune is to use the Administrative Templates profile. This profile is described in [Configure Microsoft Edge policy settings with Microsoft Intune](./configure-edge-with-intune.md). If you want to evaluate a policy that's currently not available in the Microsoft Edge Administrative Templates in Intune, you can configure Microsoft Edge using [custom settings for Windows 10 devices in Intune](/intune/configuration/custom-settings-windows-10).
The recommended way to configure Microsoft Edge with Microsoft Intune is to use the Administrative Templates profile. This profile is described in [Configure Microsoft Edge policy settings with Microsoft Intune](./configure-edge-with-intune.md). If you want to evaluate a policy that's currently not available in the Microsoft Edge Administrative Templates in Intune, you can configure Microsoft Edge using [custom settings for Windows 10 devices in Intune](/mem/intune/configuration/custom-settings-windows-10).

This section describes how to:

Expand Down Expand Up @@ -378,7 +378,7 @@ To ingest the ADMX file, follow these steps:
8. On **Custom OMA-URI Settings**, click **OK**.
9. On the "**Microsoft Edge ADMX ingested configuration - Properties**" profile (or the name you used), click **Save**.

After the profile is created and the properties set, you have to [assign the profile in Microsoft Intune](/intune/configuration/device-profile-assign).
After the profile is created and the properties set, you have to [assign the profile in Microsoft Intune](/mem/intune/configuration/device-profile-assign).

#### Confirm that the policy was set

Expand All @@ -397,13 +397,13 @@ Open the *edge://policy* page on the target device (a device you assigned the pr
- Check that the policy is in the registry and is correct. On the target device open the Windows 10 Registry Editor (**Windows key + r**, enter "*regedit*" and then press **Enter**.) Check that the policy is correctly defined in the *\Software\Policies\ Microsoft\Edge* path. If you don't find the policy in the expected path, then the policy wasn't pushed to the device correctly.
- Check that the OMA-URI path is correct, and the value is a valid XML string. If either of these are incorrect the policy won't be pushed to the target device.

For more trouble shooting tips, see [Set up Microsoft Intune](/intune/fundamentals/setup-steps) and [Sync devices](/intune/remote-actions/device-sync).
For more trouble shooting tips, see [Set up Microsoft Intune](/mem/intune/fundamentals/deployment-plan-setup) and [Sync devices](/mem/intune/remote-actions/device-sync).

## See also

- [Microsoft Edge Enterprise landing page](https://aka.ms/EdgeEnterprise)
- [Configure Microsoft Edge policy settings with Microsoft Intune](./configure-edge-with-intune.md)
- [Mobile device management](/windows/client-management/mdm/)
- [Use custom settings for Windows 10 devices in Intune](/intune/configuration/custom-settings-windows-10)
- [Use custom settings for Windows 10 devices in Intune](/mem/intune/configuration/custom-settings-windows-10)
- [Win32 and Desktop Bridge app policy configuration](/windows/client-management/mdm/win32-and-centennial-app-policy-configuration)
- [Understanding ADMX-backed policies](/windows/client-management/mdm/understanding-admx-backed-policies)
2 changes: 1 addition & 1 deletion edgeenterprise/configure-microsoft-edge-on-mac.md
Original file line number Diff line number Diff line change
Expand Up @@ -55,7 +55,7 @@ After converting the file verify that your policy data is correct and contains t
## Deploy your plist

Using Microsoft Intune, create a new device configuration profile targeting the macOS platform and select the *Preference file* profile type. Target **com.microsoft.Edge** as the preference domain name and upload your plist. For more information, see [Add a property list file to macOS devices using Microsoft Intune](/intune/configuration/preference-file-settings-macos).
Using Microsoft Intune, create a new device configuration profile targeting the macOS platform and select the *Preference file* profile type. Target **com.microsoft.Edge** as the preference domain name and upload your plist. For more information, see [Add a property list file to macOS devices using Microsoft Intune](/mem/intune/configuration/preference-file-settings-macos).

For Jamf, upload the \.plist file as a *Custom Settings* payload.

Expand Down
2 changes: 1 addition & 1 deletion edgeenterprise/deploy-edge-mac-jamf.md
Original file line number Diff line number Diff line change
Expand Up @@ -89,4 +89,4 @@ Congratulations! You've just finished configuring Jamf to deploy Microsoft Edge

- [Microsoft Edge Enterprise landing page](https://aka.ms/EdgeEnterprise)
- [Jamf.com](https://www.jamf.com/)
- [Integrate Jamf with Microsoft Intune](/intune/conditional-access-integrate-jamf)
- [Integrate Jamf with Microsoft Intune](/mem/intune/protect/conditional-access-integrate-jamf)
6 changes: 3 additions & 3 deletions edgeenterprise/deploy-edge-plan-deployment.md
Original file line number Diff line number Diff line change
Expand Up @@ -145,7 +145,7 @@ After you create your Enterprise Site List, we recommend identifying and configu

First, consider the first-run experience you want your users to have. If you want to automatically import settings from the current browser, configure the policy for [AutoImportAtFirstRun](./microsoft-edge-policies.md#autoimportatfirstrun).

For security policies, we recommend starting with the Microsoft Edge Security Baseline. The Security Baseline can be applied using the [Microsoft Security Baselines Blog](https://techcommunity.microsoft.com/t5/microsoft-security-baselines/bg-p/Microsoft-Security-Baselines) or by using [Microsoft Intune](/intune/protect/security-baseline-settings-edge).
For security policies, we recommend starting with the Microsoft Edge Security Baseline. The Security Baseline can be applied using the [Microsoft Security Baselines Blog](https://techcommunity.microsoft.com/t5/microsoft-security-baselines/bg-p/Microsoft-Security-Baselines) or by using [Microsoft Intune](/mem/intune/protect/security-baseline-settings-edge).

For other policies, we recommend reviewing the policy configurations for [Microsoft Edge](./microsoft-edge-policies.md) and [Microsoft Edge Updates](./microsoft-edge-update-policies.md).

Expand All @@ -156,7 +156,7 @@ You also want to determine how you want to do updates after you deploy Microsoft
- **Allow Microsoft Edge to update itself** (default). If you choose to allow automatic updates of Microsoft Edge, then Microsoft Edge will automatically update itself at the pace determined by one or more channels you deployed.
- **Update Microsoft Edge at your own pace**. If you prefer to have explicit control over when updates are deployed, you can disable automatic updates and deploy them yourself (see the [Update Policy reference](./microsoft-edge-update-policies.md).) After you disable automatic updates you can deploy updates for each channel using one of the following tools:

- [Intune](/intune/apps/apps-windows-edge?bc=%2fDeployEdge%2fbreadcrumb%2ftoc.json&toc=%2fDeployEdge%2ftoc.json)
- [Intune](/mem/intune/apps/apps-windows-edge?bc=%2fDeployEdge%2fbreadcrumb%2ftoc.json&toc=%2fDeployEdge%2ftoc.json)
- [Configuration Manager](./deploy-edge-with-configuration-manager.md)
- The deployment tool of your choice.

Expand Down Expand Up @@ -194,7 +194,7 @@ In addition to their own line of business apps, many organizations use apps prov

After you've defined your policies and have finished your initial app compatibility testing, you're ready to deploy to your pilot group. Deploy to your pilot group using one of the following tools:

- [Microsoft Intune for Windows](/intune/apps/apps-windows-edge?bc=%2fDeployEdge%2fbreadcrumb%2ftoc.json&toc=%2fDeployEdge%2ftoc.json), or [Microsoft Intune for macOS](/intune/apps/apps-edge-macos?bc=%2fDeployEdge%2fbreadcrumb%2ftoc.json&toc=%2fDeployEdge%2ftoc.json)
- [Microsoft Intune for Windows](/mem/intune/apps/apps-windows-edge?bc=%2fDeployEdge%2fbreadcrumb%2ftoc.json&toc=%2fDeployEdge%2ftoc.json), or [Microsoft Intune for macOS](/mem/intune/apps/apps-edge-macos?bc=%2fDeployEdge%2fbreadcrumb%2ftoc.json&toc=%2fDeployEdge%2ftoc.json)
- [Configuration Manager](./deploy-edge-with-configuration-manager.md).
- Another management tool, download and deploy the [MSI file for Microsoft Edge](https://www.microsoftedgeinsider.com/enterprise).

Expand Down
2 changes: 1 addition & 1 deletion edgeenterprise/deploy-edge-with-windows-10-updates.md
Original file line number Diff line number Diff line change
Expand Up @@ -33,7 +33,7 @@ Windows Server Update Services (WSUS) has updates for each version of Windows 10

## For Windows 10 releases prior to Windows 10 April 2018 Update (and Windows 7, 8.1, and earlier)

Windows updates to install Microsoft Edge aren't available for these versions. Consider other options for deploying Microsoft Edge to these devices such as [Configuration Manager](/configmgr/apps/deploy-use/deploy-edge?bc=%2fDeployEdge%2fbreadcrumb%2ftoc.json&toc=%2fDeployEdge%2ftoc.json) or [Intune](/intune/apps/apps-windows-edge/?bc=%2fDeployEdge%2fbreadcrumb%2ftoc.json&toc=%2fDeployEdge%2ftoc.json).
Windows updates to install Microsoft Edge aren't available for these versions. Consider other options for deploying Microsoft Edge to these devices such as [Configuration Manager](/configmgr/apps/deploy-use/deploy-edge?bc=%2fDeployEdge%2fbreadcrumb%2ftoc.json&toc=%2fDeployEdge%2ftoc.json) or [Intune](/mem/intune/apps/apps-windows-edge/?bc=%2fDeployEdge%2fbreadcrumb%2ftoc.json&toc=%2fDeployEdge%2ftoc.json).

## See also

Expand Down
2 changes: 1 addition & 1 deletion edgeenterprise/edge-ie-mode-policies.md
Original file line number Diff line number Diff line change
Expand Up @@ -29,7 +29,7 @@ Configuring IE mode requires three steps:
2. Otherwise, follow the rest of the steps in [Redirect sites from IE to Microsoft Edge](/deployedge/edge-ie-mode-policies#redirect-sites-from-ie-to-microsoft-edge)

> [!NOTE]
> Policies to enable IE mode can be configured through Intune. For more information, see [Add Microsoft Edge to Microsoft Intune](/intune/apps/apps-windows-edge?bc=%2fDeployEdge%2fbreadcrumb%2ftoc.json&toc=%2fDeployEdge%2ftoc.json) and [Configure Microsoft Edge policies with Microsoft Intune](./configure-edge-with-intune.md).
> Policies to enable IE mode can be configured through Intune. For more information, see [Add Microsoft Edge to Microsoft Intune](/mem/intune/apps/apps-windows-edge?bc=%2fDeployEdge%2fbreadcrumb%2ftoc.json&toc=%2fDeployEdge%2ftoc.json) and [Configure Microsoft Edge policies with Microsoft Intune](./configure-edge-with-intune.md).
## Configure Internet Explorer integration

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ title: "Copilot in Edge webpage summarization behavior"
ms.author: prithviokade
author: dan-wesley
manager: likuba
ms.date: 10/16/2024
ms.date: 11/07/2024
audience: ITPro
ms.topic: conceptual
ms.service: microsoft-edge
Expand All @@ -14,9 +14,6 @@ description: "This article shows the results of Copilot page summary tests."

# Copilot in Edge webpage summarization behavior

> [!NOTE]
> Page summarization features are being rolled out for Copilot with enterprise data protection in Edge. You may not yet have access to this feature.
The following chart explains the current behavior of Copilot in Edge webpage summarization on various document types. This information will be updated when support for summarization increases. This chart covers the behavior in Copilot both when enterprise data protection is applied and when it is not. Support for these document types only applies to Copilot in Edge.

> [!NOTE]
Expand Down
2 changes: 1 addition & 1 deletion edgeenterprise/index.yml
Original file line number Diff line number Diff line change
Expand Up @@ -48,7 +48,7 @@ landingContent:
- text: Deploy to Windows
url: /configmgr/apps/deploy-use/deploy-edge?bc=%2fDeployEdge%2fbreadcrumb%2ftoc.json&toc=%2fDeployEdge%2ftoc.json
- text: Deploy to macOS
url: /intune/apps/apps-edge-macos/?bc=%2fDeployEdge%2fbreadcrumb%2ftoc.json&toc=%2fDeployEdge%2ftoc.json
url: /mem/intune/apps/apps-edge-macos/?bc=%2fDeployEdge%2fbreadcrumb%2ftoc.json&toc=%2fDeployEdge%2ftoc.json
# Card 3 (col 3, 1st row)
- title: Configure Microsoft Edge
linkLists:
Expand Down

0 comments on commit 00fd92f

Please sign in to comment.