You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/devices/device-management-azure-portal.md
+6-22Lines changed: 6 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -107,25 +107,6 @@ To view or copy BitLocker keys, you need to be the owner of the device or have o
107
107
- Security Administrator
108
108
- Security Reader
109
109
110
-
## Block users from viewing their BitLocker keys (preview)
111
-
In this preview, admins can block self-service BitLocker key access to the registered owner of the device. Default users without the BitLocker read permission will be unable to view or copy their BitLocker key(s) for their owned devices.
112
-
113
-
To disable/enable self-service BitLocker recovery:
In this preview, you have the ability to infinitely scroll, reorder columns, and select all devices. You can filter the device list by these device attributes:
@@ -170,15 +151,13 @@ You must be assigned one of the following roles to view or manage device setting
170
151
- Global Reader
171
152
- Directory Reader
172
153
173
-

154
+

174
155
175
156
-**Users may join devices to Azure AD**: This setting enables you to select the users who can register their devices as Azure AD joined devices. The default is **All**.
176
157
177
158
> [!NOTE]
178
159
> The **Users may join devices to Azure AD** setting is applicable only to Azure AD join on Windows 10 or newer. This setting doesn't apply to hybrid Azure AD joined devices, [Azure AD joined VMs in Azure](./howto-vm-sign-in-azure-ad-windows.md#enable-azure-ad-login-for-a-windows-vm-in-azure), or Azure AD joined devices that use [Windows Autopilot self-deployment mode](/mem/autopilot/self-deploying) because these methods work in a userless context.
179
160
180
-
-**Additional local administrators on Azure AD joined devices**: This setting allows you to select the users who are granted local administrator rights on a device. These users are added to the Device Administrators role in Azure AD. Global Administrators in Azure AD and device owners are granted local administrator rights by default.
181
-
This option is a premium edition capability available through products like Azure AD Premium and Enterprise Mobility + Security.
182
161
-**Users may register their devices with Azure AD**: You need to configure this setting to allow users to register Windows 10 or newer personal, iOS, Android, and macOS devices with Azure AD. If you select **None**, devices aren't allowed to register with Azure AD. Enrollment with Microsoft Intune or mobile device management for Microsoft 365 requires registration. If you've configured either of these services, **ALL** is selected, and **NONE** is unavailable.
183
162
-**Require Multi-Factor Authentication to register or join devices with Azure AD**:
184
163
- We recommend organizations use the [Register or join devices user](../conditional-access/concept-conditional-access-cloud-apps.md#user-actions) action in Conditional Access to enforce multifactor authentication. You must configure this toggle to **No** if you use a Conditional Access policy to require multifactor authentication.
@@ -192,6 +171,11 @@ This option is a premium edition capability available through products like Azur
192
171
> [!NOTE]
193
172
> The **Maximum number of devices** setting applies to devices that are either Azure AD joined or Azure AD registered. This setting doesn't apply to hybrid Azure AD joined devices.
194
173
174
+
-**Additional local administrators on Azure AD joined devices**: This setting allows you to select the users who are granted local administrator rights on a device. These users are added to the Device Administrators role in Azure AD. Global Administrators in Azure AD and device owners are granted local administrator rights by default.
175
+
This option is a premium edition capability available through products like Azure AD Premium and Enterprise Mobility + Security.
176
+
177
+
-**Restrict non-admin users from recovering the BitLocker key(s) for their owned devices (preview)**: In this preview, admins can block self-service BitLocker key access to the registered owner of the device. Default users without the BitLocker read permission will be unable to view or copy their BitLocker key(s) for their owned devices.
178
+
195
179
-**Enterprise State Roaming**: For information about this setting, see [the overview article](enterprise-state-roaming-overview.md).
0 commit comments