Skip to content

Commit 529a85c

Browse files
authored
Merge pull request #78802 from MicrosoftGuyJFlo/DevicesUpdates
[Azure AD] Devices - formatting fixes
2 parents 0eababd + 09e0346 commit 529a85c

File tree

2 files changed

+9
-9
lines changed

2 files changed

+9
-9
lines changed

articles/active-directory/devices/device-management-azure-portal.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -22,9 +22,9 @@ ms.reviewer: jairoc
2222

2323
ms.collection: M365-identity-device-management
2424
---
25-
# How to manage device identity using the Azure portal
25+
# Manage device identity using the Azure portal
2626

27-
With device identity management in Azure Active Directory (Azure AD), you can ensure that your users are accessing your resources from devices that meet your standards for security and compliance.
27+
With device identity management in Azure Active Directory (Azure AD), you can ensure that your users are accessing your resources from devices that meet your standards for security and compliance.
2828

2929
This article:
3030

@@ -115,7 +115,7 @@ This section provides you with information about common device identity manageme
115115

116116
### Manage an Intune device
117117

118-
If you are an Intune administrator, you can manage devices marked as **Microsoft Intune**.
118+
If you are an Intune administrator, you can manage devices marked as **Microsoft Intune**.
119119

120120
![Manage an Intune device](./media/device-management-azure-portal/31.png)
121121

@@ -134,7 +134,7 @@ To enable / disable a device, you have two options:
134134
**Remarks:**
135135

136136
- You need to be a global administrator or cloud device administrator in Azure AD to enable / disable a device.
137-
- Disabling a device prevents a device from successfully authenticating with Azure AD, thereby preventing the device from accessing your Azure AD resources that are guarded by device CA or using your WH4B credentials.
137+
- Disabling a device prevents a device from successfully authenticating with Azure AD, thereby preventing the device from accessing your Azure AD resources that are guarded by device CA or using your WH4B credentials.
138138

139139
### Delete an Azure AD device
140140

@@ -152,7 +152,7 @@ To delete a device, you have two options:
152152

153153
- You need to be a global administrator or an Intune administrator in Azure AD to delete a device.
154154
- Deleting a device:
155-
- Prevents a device from accessing your Azure AD resources.
155+
- Prevents a device from accessing your Azure AD resources.
156156
- Removes all details that are attached to the device, for example, BitLocker keys for Windows devices.
157157
- Represents a non-recoverable activity and is not recommended unless it is required.
158158

@@ -174,9 +174,9 @@ To view or copy the BitLocker keys, you need to be either the owner of the devic
174174

175175
- Global Administrator
176176
- Helpdesk Administrator
177-
- Security Administrators
178-
- Security Readers
179-
- Intune Service Administrators
177+
- Security Administrator
178+
- Security Reader
179+
- Intune Service Administrator
180180

181181
> [!NOTE]
182182
> Hybrid Azure AD Joined Windows 10 devices do not have an owner. So, if you are looking for a device by owner and didn't find it, search by the device ID.

articles/active-directory/devices/overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -152,5 +152,5 @@ As a rule of a thumb, you should use:
152152
- To set up:
153153
- Azure Active Directory registered Windows 10 devices, see [How to configure Azure Active Directory registered Windows 10 devices](../user-help/device-management-azuread-registered-devices-windows10-setup.md).
154154
- Azure Active Directory joined devices, see [How to plan your Azure Active Directory join implementation](azureadjoin-plan.md).
155-
- Hybrid Azure AD joined devices, see [How to plan your hybrid Azure Active Directory join implementation](hybrid-azuread-join-plan.md).
155+
- Hybrid Azure AD joined devices, see [How to plan your hybrid Azure Active Directory join implementation](hybrid-azuread-join-plan.md).
156156
- To learn more about device-based conditional access, see [Configure Azure Active Directory device-based conditional access policies](../conditional-access/require-managed-devices.md).

0 commit comments

Comments
 (0)