diff --git a/edgeenterprise/configure-edge-with-intune.md b/edgeenterprise/configure-edge-with-intune.md index 47e4b1ce4..82468ad7c 100644 --- a/edgeenterprise/configure-edge-with-intune.md +++ b/edgeenterprise/configure-edge-with-intune.md @@ -18,7 +18,7 @@ This article explains how to configure Microsoft Edge policy settings for Window You can configure Microsoft Edge policies and settings by adding a device configuration profile to Microsoft Intune. Using Intune to manage and enforce policies is equivalent to using Active Directory Group Policy or configuring local Group Policy Object (GPO) settings on user devices. -For more information about managing Microsoft Edge policies with Microsoft Intune, you can read [Manage web access by using Microsoft Edge with Microsoft Intune](/intune/manage-microsoft-edge), but keep in mind that the linked article is specific to Microsoft Edge version 45 and earlier and therefore may contain information and references that don't apply to Microsoft Edge Enterprise version 77 and later. +For more information about managing Microsoft Edge policies with Microsoft Intune, you can read [Manage web access by using Microsoft Edge with Microsoft Intune](/mem/intune/apps/manage-microsoft-edge), but keep in mind that the linked article is specific to Microsoft Edge version 45 and earlier and therefore may contain information and references that don't apply to Microsoft Edge Enterprise version 77 and later. > [!TIP] > For information on how to configure Microsoft Edge on macOS using Microsoft Intune, see [Configure for macOS](configure-microsoft-edge-on-mac.md). @@ -86,7 +86,7 @@ The next screenshot shows the form for the **Basics** tab and the menu bar shows 15. On the **Scope tags** tab, add a Scope tag if wanted, otherwise click the **Next** button. -16. On the **Assignments** tab, click **+ Select groups to include** to assign this policy to the Microsoft Entra group that contains the devices or the users that you want to receive this policy setting. See [Assign user and device profiles in Microsoft Intune](/intune/device-profile-assign) for information about how to assign the profile to your Microsoft Entra user or device groups. +16. On the **Assignments** tab, click **+ Select groups to include** to assign this policy to the Microsoft Entra group that contains the devices or the users that you want to receive this policy setting. See [Assign user and device profiles in Microsoft Intune](/mem/intune/configuration/device-profile-assign) for information about how to assign the profile to your Microsoft Entra user or device groups. ![Select groups to include](./media/configure-edge-with-intune/create-profile-assignments-tab.png) @@ -98,11 +98,11 @@ The next screenshot shows the form for the **Basics** tab and the menu bar shows ![Select Microsoft Edge Policy groups to include](./media/configure-edge-with-intune/create-profile-new-policy-finished.png) -For more information about Windows 10 profiles, see [Use Windows 10 templates to configure group policy settings in Microsoft Intune](/intune/administrative-templates-windows). +For more information about Windows 10 profiles, see [Use Windows 10 templates to configure group policy settings in Microsoft Intune](/mem/intune/configuration/administrative-templates-windows). ## See also - [Microsoft Edge Enterprise landing page](https://aka.ms/EdgeEnterprise) -- [Manage web access by using Microsoft Edge with Microsoft Intune](/intune/manage-microsoft-edge) -- [Use Windows 10 templates to configure group policy settings in Microsoft Intune](/intune/administrative-templates-windows) -- [Deploy Microsoft Edge using Microsoft Intune](/intune/apps/apps-windows-edge/?bc=%2fDeployEdge%2fbreadcrumb%2ftoc.json&toc=%2fDeployEdge%2ftoc.json) +- [Manage web access by using Microsoft Edge with Microsoft Intune](/mem/intune/apps/manage-microsoft-edge) +- [Use Windows 10 templates to configure group policy settings in Microsoft Intune](/mem/intune/configuration/administrative-templates-windows) +- [Deploy Microsoft Edge using Microsoft Intune](/mem/intune/apps/apps-windows-edge/?bc=%2fDeployEdge%2fbreadcrumb%2ftoc.json&toc=%2fDeployEdge%2ftoc.json) diff --git a/edgeenterprise/configure-edge-with-mdm.md b/edgeenterprise/configure-edge-with-mdm.md index d76c34d00..806da7937 100644 --- a/edgeenterprise/configure-edge-with-mdm.md +++ b/edgeenterprise/configure-edge-with-mdm.md @@ -287,7 +287,7 @@ OMA-URI examples with their URI path, type, and an example value. ## Configure Microsoft Edge in Intune using ADMX ingestion -The recommended way to configure Microsoft Edge with Microsoft Intune is to use the Administrative Templates profile. This profile is described in [Configure Microsoft Edge policy settings with Microsoft Intune](./configure-edge-with-intune.md). If you want to evaluate a policy that's currently not available in the Microsoft Edge Administrative Templates in Intune, you can configure Microsoft Edge using [custom settings for Windows 10 devices in Intune](/intune/configuration/custom-settings-windows-10). +The recommended way to configure Microsoft Edge with Microsoft Intune is to use the Administrative Templates profile. This profile is described in [Configure Microsoft Edge policy settings with Microsoft Intune](./configure-edge-with-intune.md). If you want to evaluate a policy that's currently not available in the Microsoft Edge Administrative Templates in Intune, you can configure Microsoft Edge using [custom settings for Windows 10 devices in Intune](/mem/intune/configuration/custom-settings-windows-10). This section describes how to: @@ -378,7 +378,7 @@ To ingest the ADMX file, follow these steps: 8. On **Custom OMA-URI Settings**, click **OK**. 9. On the "**Microsoft Edge ADMX ingested configuration - Properties**" profile (or the name you used), click **Save**. -After the profile is created and the properties set, you have to [assign the profile in Microsoft Intune](/intune/configuration/device-profile-assign). +After the profile is created and the properties set, you have to [assign the profile in Microsoft Intune](/mem/intune/configuration/device-profile-assign). #### Confirm that the policy was set @@ -397,13 +397,13 @@ Open the *edge://policy* page on the target device (a device you assigned the pr - Check that the policy is in the registry and is correct. On the target device open the Windows 10 Registry Editor (**Windows key + r**, enter "*regedit*" and then press **Enter**.) Check that the policy is correctly defined in the *\Software\Policies\ Microsoft\Edge* path. If you don't find the policy in the expected path, then the policy wasn't pushed to the device correctly. - Check that the OMA-URI path is correct, and the value is a valid XML string. If either of these are incorrect the policy won't be pushed to the target device. -For more trouble shooting tips, see [Set up Microsoft Intune](/intune/fundamentals/setup-steps) and [Sync devices](/intune/remote-actions/device-sync). +For more trouble shooting tips, see [Set up Microsoft Intune](/mem/intune/fundamentals/deployment-plan-setup) and [Sync devices](/mem/intune/remote-actions/device-sync). ## See also - [Microsoft Edge Enterprise landing page](https://aka.ms/EdgeEnterprise) - [Configure Microsoft Edge policy settings with Microsoft Intune](./configure-edge-with-intune.md) - [Mobile device management](/windows/client-management/mdm/) -- [Use custom settings for Windows 10 devices in Intune](/intune/configuration/custom-settings-windows-10) +- [Use custom settings for Windows 10 devices in Intune](/mem/intune/configuration/custom-settings-windows-10) - [Win32 and Desktop Bridge app policy configuration](/windows/client-management/mdm/win32-and-centennial-app-policy-configuration) - [Understanding ADMX-backed policies](/windows/client-management/mdm/understanding-admx-backed-policies) \ No newline at end of file diff --git a/edgeenterprise/configure-microsoft-edge-on-mac.md b/edgeenterprise/configure-microsoft-edge-on-mac.md index 9170c210b..c6e268a52 100644 --- a/edgeenterprise/configure-microsoft-edge-on-mac.md +++ b/edgeenterprise/configure-microsoft-edge-on-mac.md @@ -55,7 +55,7 @@ After converting the file verify that your policy data is correct and contains t ## Deploy your plist -Using Microsoft Intune, create a new device configuration profile targeting the macOS platform and select the *Preference file* profile type. Target **com.microsoft.Edge** as the preference domain name and upload your plist. For more information, see [Add a property list file to macOS devices using Microsoft Intune](/intune/configuration/preference-file-settings-macos). +Using Microsoft Intune, create a new device configuration profile targeting the macOS platform and select the *Preference file* profile type. Target **com.microsoft.Edge** as the preference domain name and upload your plist. For more information, see [Add a property list file to macOS devices using Microsoft Intune](/mem/intune/configuration/preference-file-settings-macos). For Jamf, upload the \.plist file as a *Custom Settings* payload. diff --git a/edgeenterprise/deploy-edge-mac-jamf.md b/edgeenterprise/deploy-edge-mac-jamf.md index 09f7f4dd1..79253d274 100644 --- a/edgeenterprise/deploy-edge-mac-jamf.md +++ b/edgeenterprise/deploy-edge-mac-jamf.md @@ -89,4 +89,4 @@ Congratulations! You've just finished configuring Jamf to deploy Microsoft Edge - [Microsoft Edge Enterprise landing page](https://aka.ms/EdgeEnterprise) - [Jamf.com](https://www.jamf.com/) -- [Integrate Jamf with Microsoft Intune](/intune/conditional-access-integrate-jamf) \ No newline at end of file +- [Integrate Jamf with Microsoft Intune](/mem/intune/protect/conditional-access-integrate-jamf) \ No newline at end of file diff --git a/edgeenterprise/deploy-edge-plan-deployment.md b/edgeenterprise/deploy-edge-plan-deployment.md index 06570c8a6..aa767cad8 100644 --- a/edgeenterprise/deploy-edge-plan-deployment.md +++ b/edgeenterprise/deploy-edge-plan-deployment.md @@ -145,7 +145,7 @@ After you create your Enterprise Site List, we recommend identifying and configu First, consider the first-run experience you want your users to have. If you want to automatically import settings from the current browser, configure the policy for [AutoImportAtFirstRun](./microsoft-edge-policies.md#autoimportatfirstrun). -For security policies, we recommend starting with the Microsoft Edge Security Baseline. The Security Baseline can be applied using the [Microsoft Security Baselines Blog](https://techcommunity.microsoft.com/t5/microsoft-security-baselines/bg-p/Microsoft-Security-Baselines) or by using [Microsoft Intune](/intune/protect/security-baseline-settings-edge). +For security policies, we recommend starting with the Microsoft Edge Security Baseline. The Security Baseline can be applied using the [Microsoft Security Baselines Blog](https://techcommunity.microsoft.com/t5/microsoft-security-baselines/bg-p/Microsoft-Security-Baselines) or by using [Microsoft Intune](/mem/intune/protect/security-baseline-settings-edge). For other policies, we recommend reviewing the policy configurations for [Microsoft Edge](./microsoft-edge-policies.md) and [Microsoft Edge Updates](./microsoft-edge-update-policies.md). @@ -156,7 +156,7 @@ You also want to determine how you want to do updates after you deploy Microsoft - **Allow Microsoft Edge to update itself** (default). If you choose to allow automatic updates of Microsoft Edge, then Microsoft Edge will automatically update itself at the pace determined by one or more channels you deployed. - **Update Microsoft Edge at your own pace**. If you prefer to have explicit control over when updates are deployed, you can disable automatic updates and deploy them yourself (see the [Update Policy reference](./microsoft-edge-update-policies.md).) After you disable automatic updates you can deploy updates for each channel using one of the following tools: -- [Intune](/intune/apps/apps-windows-edge?bc=%2fDeployEdge%2fbreadcrumb%2ftoc.json&toc=%2fDeployEdge%2ftoc.json) +- [Intune](/mem/intune/apps/apps-windows-edge?bc=%2fDeployEdge%2fbreadcrumb%2ftoc.json&toc=%2fDeployEdge%2ftoc.json) - [Configuration Manager](./deploy-edge-with-configuration-manager.md) - The deployment tool of your choice. @@ -194,7 +194,7 @@ In addition to their own line of business apps, many organizations use apps prov After you've defined your policies and have finished your initial app compatibility testing, you're ready to deploy to your pilot group. Deploy to your pilot group using one of the following tools: -- [Microsoft Intune for Windows](/intune/apps/apps-windows-edge?bc=%2fDeployEdge%2fbreadcrumb%2ftoc.json&toc=%2fDeployEdge%2ftoc.json), or [Microsoft Intune for macOS](/intune/apps/apps-edge-macos?bc=%2fDeployEdge%2fbreadcrumb%2ftoc.json&toc=%2fDeployEdge%2ftoc.json) +- [Microsoft Intune for Windows](/mem/intune/apps/apps-windows-edge?bc=%2fDeployEdge%2fbreadcrumb%2ftoc.json&toc=%2fDeployEdge%2ftoc.json), or [Microsoft Intune for macOS](/mem/intune/apps/apps-edge-macos?bc=%2fDeployEdge%2fbreadcrumb%2ftoc.json&toc=%2fDeployEdge%2ftoc.json) - [Configuration Manager](./deploy-edge-with-configuration-manager.md). - Another management tool, download and deploy the [MSI file for Microsoft Edge](https://www.microsoftedgeinsider.com/enterprise). diff --git a/edgeenterprise/deploy-edge-with-windows-10-updates.md b/edgeenterprise/deploy-edge-with-windows-10-updates.md index 7d0b2e2ae..c9c20cc1f 100644 --- a/edgeenterprise/deploy-edge-with-windows-10-updates.md +++ b/edgeenterprise/deploy-edge-with-windows-10-updates.md @@ -33,7 +33,7 @@ Windows Server Update Services (WSUS) has updates for each version of Windows 10 ## For Windows 10 releases prior to Windows 10 April 2018 Update (and Windows 7, 8.1, and earlier) -Windows updates to install Microsoft Edge aren't available for these versions. Consider other options for deploying Microsoft Edge to these devices such as [Configuration Manager](/configmgr/apps/deploy-use/deploy-edge?bc=%2fDeployEdge%2fbreadcrumb%2ftoc.json&toc=%2fDeployEdge%2ftoc.json) or [Intune](/intune/apps/apps-windows-edge/?bc=%2fDeployEdge%2fbreadcrumb%2ftoc.json&toc=%2fDeployEdge%2ftoc.json). +Windows updates to install Microsoft Edge aren't available for these versions. Consider other options for deploying Microsoft Edge to these devices such as [Configuration Manager](/configmgr/apps/deploy-use/deploy-edge?bc=%2fDeployEdge%2fbreadcrumb%2ftoc.json&toc=%2fDeployEdge%2ftoc.json) or [Intune](/mem/intune/apps/apps-windows-edge/?bc=%2fDeployEdge%2fbreadcrumb%2ftoc.json&toc=%2fDeployEdge%2ftoc.json). ## See also diff --git a/edgeenterprise/edge-ie-mode-policies.md b/edgeenterprise/edge-ie-mode-policies.md index b21c2d6c6..7973caed0 100644 --- a/edgeenterprise/edge-ie-mode-policies.md +++ b/edgeenterprise/edge-ie-mode-policies.md @@ -29,7 +29,7 @@ Configuring IE mode requires three steps: 2. Otherwise, follow the rest of the steps in [Redirect sites from IE to Microsoft Edge](/deployedge/edge-ie-mode-policies#redirect-sites-from-ie-to-microsoft-edge) > [!NOTE] -> Policies to enable IE mode can be configured through Intune. For more information, see [Add Microsoft Edge to Microsoft Intune](/intune/apps/apps-windows-edge?bc=%2fDeployEdge%2fbreadcrumb%2ftoc.json&toc=%2fDeployEdge%2ftoc.json) and [Configure Microsoft Edge policies with Microsoft Intune](./configure-edge-with-intune.md). +> Policies to enable IE mode can be configured through Intune. For more information, see [Add Microsoft Edge to Microsoft Intune](/mem/intune/apps/apps-windows-edge?bc=%2fDeployEdge%2fbreadcrumb%2ftoc.json&toc=%2fDeployEdge%2ftoc.json) and [Configure Microsoft Edge policies with Microsoft Intune](./configure-edge-with-intune.md). ## Configure Internet Explorer integration diff --git a/edgeenterprise/edge-learnmore-copilot-page-summary-results.md b/edgeenterprise/edge-learnmore-copilot-page-summary-results.md index 8da602216..3e3952d82 100644 --- a/edgeenterprise/edge-learnmore-copilot-page-summary-results.md +++ b/edgeenterprise/edge-learnmore-copilot-page-summary-results.md @@ -3,7 +3,7 @@ title: "Copilot in Edge webpage summarization behavior" ms.author: prithviokade author: dan-wesley manager: likuba -ms.date: 10/16/2024 +ms.date: 11/07/2024 audience: ITPro ms.topic: conceptual ms.service: microsoft-edge @@ -14,9 +14,6 @@ description: "This article shows the results of Copilot page summary tests." # Copilot in Edge webpage summarization behavior -> [!NOTE] -> Page summarization features are being rolled out for Copilot with enterprise data protection in Edge. You may not yet have access to this feature. - The following chart explains the current behavior of Copilot in Edge webpage summarization on various document types. This information will be updated when support for summarization increases. This chart covers the behavior in Copilot both when enterprise data protection is applied and when it is not. Support for these document types only applies to Copilot in Edge. > [!NOTE] diff --git a/edgeenterprise/index.yml b/edgeenterprise/index.yml index 48771ac7f..1a6d1d907 100644 --- a/edgeenterprise/index.yml +++ b/edgeenterprise/index.yml @@ -48,7 +48,7 @@ landingContent: - text: Deploy to Windows url: /configmgr/apps/deploy-use/deploy-edge?bc=%2fDeployEdge%2fbreadcrumb%2ftoc.json&toc=%2fDeployEdge%2ftoc.json - text: Deploy to macOS - url: /intune/apps/apps-edge-macos/?bc=%2fDeployEdge%2fbreadcrumb%2ftoc.json&toc=%2fDeployEdge%2ftoc.json + url: /mem/intune/apps/apps-edge-macos/?bc=%2fDeployEdge%2fbreadcrumb%2ftoc.json&toc=%2fDeployEdge%2ftoc.json # Card 3 (col 3, 1st row) - title: Configure Microsoft Edge linkLists: