Skip to content

Commit 4e38864

Browse files
Apply suggestions from code review
Pedro review Co-authored-by: Pedro Sousa <[email protected]>
1 parent 22e9709 commit 4e38864

File tree

1 file changed

+14
-14
lines changed
  • src/content/docs/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/partners

1 file changed

+14
-14
lines changed

src/content/docs/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/partners/intune.mdx

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -132,13 +132,13 @@ Deploy configuration profiles (steps 1, 2, and 3) before the WARP application (s
132132

133133
You must deploy a [user-side certificate](/cloudflare-one/connections/connect-devices/user-side-certificates/) so that devices managed by Intune can establish trust with Cloudflare when their traffic is inspected.
134134

135-
1. Log into [Zero Trust](https://one.dash.cloudflare.com/).
135+
1. Log in to [Zero Trust](https://one.dash.cloudflare.com/).
136136

137137
2. Go to **Settings** > **Resources** > under **Certificates**, select **Manage**.
138138

139-
3. Find your [certificate](/cloudflare-one/connections/connect-devices/user-side-certificates/) and select the three dot icon next to it > select **Download .crt**.
139+
3. Find your [certificate](/cloudflare-one/connections/connect-devices/user-side-certificates/) and select the three dotted icon next to it > select **Download .crt**.
140140

141-
4. In the [Microsoft Intune admin center](https://intune.microsoft.com) > go to **Devices** > select **macOS**.
141+
4. In the [Microsoft Intune admin center](https://intune.microsoft.com), go to **Devices** > select **macOS**.
142142

143143
![Intune admin console where you select macOS before creating a policy](~/assets/images/cloudflare-one/connections/intune/devices-macos.png)
144144

@@ -150,7 +150,7 @@ You must deploy a [user-side certificate](/cloudflare-one/connections/connect-de
150150

151151
7. For **Profile Type**, select _Templates_ > select **Trusted certificate** as the **Template name** > select **Create**.
152152

153-
8. In **Basics**, input the necessary field(s) and give your policy a name like "Cloudflare certificate" > select **Next**.
153+
8. In **Basics**, input the necessary field(s) and give your policy a name like `Cloudflare certificate` > select **Next**.
154154

155155
9. For **Deployment Channel**, select **Device Channel**.
156156

@@ -160,21 +160,21 @@ You must deploy a [user-side certificate](/cloudflare-one/connections/connect-de
160160

161161
12. Review your configuration in **Review + create** and select **Create**.
162162

163-
Sharing this certificate with Intune automates the installation of this certificate on your user devices. Creating trust between browsers on a user's device and Cloudflare.
163+
Sharing this certificate with Intune automates the installation of this certificate on your user devices, creating trust between browsers on a user's device and Cloudflare.
164164

165165
### 2. Allow WARP system extensions
166166

167167
Before deploying WARP, you need to allow its system extensions.
168168

169-
1. In the [Microsoft Intune admin center](https://intune.microsoft.com) > go to **Devices** > **macOS**.
169+
1. In the [Microsoft Intune admin center](https://intune.microsoft.com), go to **Devices** > **macOS**.
170170

171171
2. Under **Manage devices**, select **Configuration**.
172172

173173
3. Select **Create** > **New Policy**.
174174

175175
4. For **Profile type**, select _Settings catalog_ > select **Create**.
176176

177-
5. In **Basics**, input the necessary field(s) and give your policy a name like "WARP System Extensions" > select **Next**.
177+
5. In **Basics**, input the necessary field(s) and give your policy a name like `WARP System Extensions` > select **Next**.
178178

179179
6. In **Configuration settings**, select **Add settings**.
180180

@@ -203,7 +203,7 @@ This step allows WARP to install without user interaction. By completing this st
203203

204204
1. Open a text editor and paste in the following `.mobileconfig` template:
205205

206-
```
206+
```xml
207207
<?xml version="1.0" encoding="UTF-8"?>
208208
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
209209
<plist version="1.0">
@@ -255,7 +255,7 @@ This step allows WARP to install without user interaction. By completing this st
255255
3. Update your organization's string (`YOUR_TEAM_NAME_HERE`) with your [team name](/cloudflare-one/faq/getting-started-faq/#what-is-a-team-domainteam-name).
256256

257257
4. Modify the file with your desired [deployment parameters](/cloudflare-one/connections/connect-devices/warp/deployment/mdm-deployment/parameters/).
258-
```
258+
```xml
259259
<array>
260260
<dict>
261261
<key>organization</key>
@@ -266,7 +266,7 @@ This step allows WARP to install without user interaction. By completing this st
266266
:::tip[Best practice]
267267
Start by deploying the template in its default, minimal form. This helps you verify a successful deployment before adding custom parameters.
268268
:::
269-
5. In the [Microsoft Intune admin center](https://intune.microsoft.com) > go to **Devices** > **macOS**.
269+
5. In the [Microsoft Intune admin center](https://intune.microsoft.com), go to **Devices** > **macOS**.
270270

271271
6. Under **Manage devices**, select **Configuration**.
272272

@@ -280,7 +280,7 @@ This step allows WARP to install without user interaction. By completing this st
280280

281281
11. For **Deployment Channel**, select **Device Channel**.
282282

283-
12. Under **Configuration profile file**, upload your `.mobileconfig` file that you made in your text editor in step one > select **Next**.
283+
12. Under **Configuration profile file**, upload the `.mobileconfig` file that you created in your text editor in step 1 > select **Next**.
284284

285285
13. In **Assignments**, select an option (for example, **Add all devices** or **Add all users**) that is valid for your scope. This will be the same scope for all steps.
286286

@@ -294,7 +294,7 @@ By completing this step, you preconfigured WARP with your team settings so it co
294294
Complete Step 4 one hour after steps 1, 2, and 3 so clients have enough time to check in and update their device configurations.
295295
:::
296296

297-
1. Log into [Zero Trust](https://one.dash.cloudflare.com/).
297+
1. Log in to [Zero Trust](https://one.dash.cloudflare.com/).
298298

299299
2. Go to **Settings** > **Resources** > find macOS under **Download the WARP client** > select **Download release**.
300300

@@ -303,13 +303,13 @@ Complete Step 4 one hour after steps 1, 2, and 3 so clients have enough time to
303303
:::note[Repeat this step to update WARP when a new release is available]
304304
Every time WARP releases a new version, you must repeat this process and get a new `.pkg` file for the new WARP version.
305305
:::
306-
3. Log into the [Microsoft Intune admin center](https://intune.microsoft.com) > **Apps** > **MacOS**.
306+
3. Log in to the [Microsoft Intune admin center](https://intune.microsoft.com), and go to **Apps** > **MacOS**.
307307

308308
4. Select **Create**.
309309

310310
5. For **App type**, select _macOS app (PKG)_.
311311

312-
6. In **App information**, select the `.pkg` file you downloaded and input required details. Enter "Cloudflare" as the Publisher.
312+
6. In **App information**, select the `.pkg` file you downloaded and input required details. Enter `Cloudflare` as the Publisher.
313313

314314
7. In **Requirements**, refer to the OS versions listed in [stable releases for macOS](/cloudflare-one/connections/connect-devices/warp/download-warp/#macos) and find what matches for you.
315315

0 commit comments

Comments
 (0)