Skip to content

Commit 6c6dbb5

Browse files
Update device-management-azure-portal.md
1 parent a913ac9 commit 6c6dbb5

File tree

1 file changed

+6
-22
lines changed

1 file changed

+6
-22
lines changed

articles/active-directory/devices/device-management-azure-portal.md

Lines changed: 6 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -107,25 +107,6 @@ To view or copy BitLocker keys, you need to be the owner of the device or have o
107107
- Security Administrator
108108
- Security Reader
109109

110-
## Block users from viewing their BitLocker keys (preview)
111-
In this preview, admins can block self-service BitLocker key access to the registered owner of the device. Default users without the BitLocker read permission will be unable to view or copy their BitLocker key(s) for their owned devices.
112-
113-
To disable/enable self-service BitLocker recovery:
114-
115-
```PowerShell
116-
Connect-MgGraph -Scopes Policy.ReadWrite.Authorization
117-
$authPolicyUri = "https://graph.microsoft.com/beta/policies/authorizationPolicy/authorizationPolicy"
118-
$body = @{
119-
defaultUserRolePermissions = @{
120-
allowedToReadBitlockerKeysForOwnedDevice = $false #Set this to $true to allow BitLocker self-service recovery
121-
}
122-
}| ConvertTo-Json
123-
Invoke-MgGraphRequest -Uri $authPolicyUri -Method PATCH -Body $body
124-
# Show current policy setting
125-
$authPolicy = Invoke-MgGraphRequest -Uri $authPolicyUri
126-
$authPolicy.defaultUserRolePermissions
127-
```
128-
129110
## View and filter your devices (preview)
130111

131112
In this preview, you have the ability to infinitely scroll, reorder columns, and select all devices. You can filter the device list by these device attributes:
@@ -170,15 +151,13 @@ You must be assigned one of the following roles to view or manage device setting
170151
- Global Reader
171152
- Directory Reader
172153

173-
![Screenshot that shows device settings related to Azure AD.](./media/device-management-azure-portal/device-settings-azure-portal.png)
154+
![Screenshot that shows device settings related to Azure AD.](./media/device-management-azure-portal/deviceSettings.jpg)
174155

175156
- **Users may join devices to Azure AD**: This setting enables you to select the users who can register their devices as Azure AD joined devices. The default is **All**.
176157

177158
> [!NOTE]
178159
> The **Users may join devices to Azure AD** setting is applicable only to Azure AD join on Windows 10 or newer. This setting doesn't apply to hybrid Azure AD joined devices, [Azure AD joined VMs in Azure](./howto-vm-sign-in-azure-ad-windows.md#enable-azure-ad-login-for-a-windows-vm-in-azure), or Azure AD joined devices that use [Windows Autopilot self-deployment mode](/mem/autopilot/self-deploying) because these methods work in a userless context.
179160
180-
- **Additional local administrators on Azure AD joined devices**: This setting allows you to select the users who are granted local administrator rights on a device. These users are added to the Device Administrators role in Azure AD. Global Administrators in Azure AD and device owners are granted local administrator rights by default.
181-
This option is a premium edition capability available through products like Azure AD Premium and Enterprise Mobility + Security.
182161
- **Users may register their devices with Azure AD**: You need to configure this setting to allow users to register Windows 10 or newer personal, iOS, Android, and macOS devices with Azure AD. If you select **None**, devices aren't allowed to register with Azure AD. Enrollment with Microsoft Intune or mobile device management for Microsoft 365 requires registration. If you've configured either of these services, **ALL** is selected, and **NONE** is unavailable.
183162
- **Require Multi-Factor Authentication to register or join devices with Azure AD**:
184163
- We recommend organizations use the [Register or join devices user](../conditional-access/concept-conditional-access-cloud-apps.md#user-actions) action in Conditional Access to enforce multifactor authentication. You must configure this toggle to **No** if you use a Conditional Access policy to require multifactor authentication.
@@ -192,6 +171,11 @@ This option is a premium edition capability available through products like Azur
192171
> [!NOTE]
193172
> The **Maximum number of devices** setting applies to devices that are either Azure AD joined or Azure AD registered. This setting doesn't apply to hybrid Azure AD joined devices.
194173
174+
- **Additional local administrators on Azure AD joined devices**: This setting allows you to select the users who are granted local administrator rights on a device. These users are added to the Device Administrators role in Azure AD. Global Administrators in Azure AD and device owners are granted local administrator rights by default.
175+
This option is a premium edition capability available through products like Azure AD Premium and Enterprise Mobility + Security.
176+
177+
- **Restrict non-admin users from recovering the BitLocker key(s) for their owned devices (preview)**: In this preview, admins can block self-service BitLocker key access to the registered owner of the device. Default users without the BitLocker read permission will be unable to view or copy their BitLocker key(s) for their owned devices.
178+
195179
- **Enterprise State Roaming**: For information about this setting, see [the overview article](enterprise-state-roaming-overview.md).
196180

197181
## Audit logs

0 commit comments

Comments
 (0)