Introducing the Microsoft Intune End User Enrollment Guide

Help Your Users Get Their Devices Enrolled in Microsoft Intune with the End User Enrolment Guide
Choosing how you manage mobile devices within your organization is just one of many steps involved in protecting your corporate data while enabling a great end user experience on the devices they choose.
Now, you need to encourage your users to enroll their devices into Microsoft Intune to be managed. We’ve created the Microsoft Intune End User Enrollment Guide to help get you started. This two-page document helps explain to your users the importance of protecting corporate data, as well as their own, by letting your IT department manage their devices. It explains what may happen on their devices (installation of apps, security policies applied, etc.) and what will NOT happen on their devices (collecting personal information like phone and...
This topic first appeared in the Spiceworks Community

Depends which Guide you're looking at in 1.9.
You can choose the Full Guide (in Standard or Classic) views, Channel Guide, Half Guide or Mini Guide.
7xxx HD
Full Guide Standard = 7 channels (hit Guide once)
Full Guide Classic = 5 channels (available option in Television settings menu)
Channel Guide = 7 channels horizontally (hit Guide twice)
Mini Guide = really just one channel at a time (hit the down arrow on live TV)
Half Guide = 6 channels (hit the up arrow on live TV)
2500 / 6xxx / 7xxx SD
Full Guide Standard = 6 channels (hit Guide once)
Full Guide Classic = 4 channels (available option in Television settings menu)
Channel Guide = 6 channels horizontally (hit Guide twice)
Mini Guide = really just one channel at a time (hit the down arrow on live TV)
Half Guide = 5 channels (hit the up arrow on live TV)

Similar Messages

  • End user training guide for FI/CO

    Hi!
    Can any one send me end user training guide for FI/CO in ppt presentation.
    thanks & regards,
    RAemsh B

    Hi:
    Refer to SAP Best Pratices.In this you will Business Process procedure. You can use that end user training guide for FI/CO
    http://help.sap.com/bp_bblibrary/500/BBlibrary_start.htm
    Refer to SAP Accounts Receivable documentation.
    web.mit.edu/cao/www/AR/index.html
    Additionally type the t.code in google.com.
    Ex: SAP F-02 in google.com.You may find the user manuals.
    Please let me know if you need more  information.
    Assign points if useful.
    Regards
    Sridhar M

  • Getting the Error : SSLException :End user tried to act as a CA in WAS

    I have a web service application running in WAS 5.1 and client application running in WAS 6.1.
    We use server side authentication and we have configured the trust store keystore on the client side.
    But when we try to invoke the wenservice i get the error "SSLException :End user tried to act as a CA".
    Kindly let me know the possibility of this error.
    Thanks In advance
    Shyam.

    Hello,
    I tested again and with the same code and the same java libraries. There is no problem using Apache with OpenSSL 0.9.6h. The problem only occures with OpenSSL 0.9.7.
    Are there any known incompatibilities between JSSE and OpenSSL 0.9.7?
    TIA,
    Robert Stroetgen. :)

  • What is the meaning of KEYBOARD/USER'S GUIDE-SAU

    What's the meaning of KEYBOARD/USER'S GUIDE-SAU

    This appears on your invoice or order when you order a MacBook Air.  It specifies the country your machine is being set up for.

  • How do enter the adobe pdf end user liscense agreement?

    i do not know how to look for the adobe pdf end user liscense agreement?
    help?

    Depending on which Adobe application you are using, the EUA will vary somewhat
    and there are several applications that handle PDF products, Adobe Reader is one.
    You could check into the results linked here that show several end-user-agreements
    with Adobe over a few product lines; to see what may apply to whatever you're using.
    •Adobe pdf end user agreement -- google results link:
    https://www.google.com/?gws_rd=ssl#q=Adobe+pdf+end+user+license+agreement
    In the open application, near where the name of the product appears, you should be
    able to check into such places as "about Adobe..." when you click on the Name.
    Since I only have Adobe Reader, not any of their retail application programs, what
    little that tells me may not be anywhere near enough to answer your open question.
    In Adobe Reader, if it were not to work on initial installation, I'd likely have to open the
    application from its location in the Applications folder (in Adobe reader folder) and then
    agree to the terms of the EUA in a small window that would appear at that point... and
    after that any use of the Reader should simply be almost automatic if another application
    sends a PFD request for the Reader to run and let me read content. Mine is set to not
    do anything automatically, for security purposes, though. Hope the search links help.
    Good luck & happy computing!

  • DPM 2012 still requires put end users into local admin groups for the purpose of end user data recovery?

    On client computers that are protected by DPM 2010 and prior versions, you had to put the end users account in the local administrators group. If you did not add the end user account to the local administrators group you would get this error after opening
    the recovery tab in the DPM client: “DPM found no recovery points which you are authorized to restore on the specified DPM server. You can restore only those recovery points for which you were an administrator at the time the
    backup was taken. To restore other recovery points, contact your DPM administrator, or attempt to restore from another DPM.”  This is not ideal on many networks because the end users are not allowed to have local administrator access.
    Ths fix to this was included in hotfix 2465832 found here: http://support.microsoft.com/kb/2465832.
    This hotfix (a hotfix rollup package for DPM 2010) resolves other issues with DPM 2010 as well. You can find the full list of what this hotfix corrects on that link.
    One would think this issue should have been resolved in DPM 2012, however I am encountering the same exact issue, had to include end-users into the workstation local admin group before they can search for recovery points on the DPM server. This is not acceptable
    practice.
    Is there a new hotfix for the same issue on DPM 2012? I am hesitated to apply KB2465832 since it also includes many other fixes for DPM 2010, which may not appicable for version 2012.
    Please help.
    Thanks,

    This is a hands off solution to allow all users that use a machine to be able to restore their own files.
    1) Make these two cmd files and save them in c:\temp
    2) Using windows scheduler – schedule addperms.cmd to run daily – any new users that log onto the machine will automatically be able to restore their own files.
    <addperms.cmd>
    Cmd.exe /v /c c:\temp\addreg.cmd
    <addreg.cmd>
    set users=
    echo Windows Registry Editor Version 5.00>c:\temp\perms.reg
    echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft Data Protection Manager\Agent\ClientProtection]>>c:\temp\perms.reg
    FOR /F "Tokens=*" %%n IN ('dir c:\users\*. /b') do set users=!users!%Userdomain%\\%%n,
    echo "ClientOwners"=^"%users%%Userdomain%\\bogususer^">>c:\temp\perms.reg
    REG IMPORT c:\temp\perms.reg
    Del c:\temp\perms.reg
    Please remember to click “Mark as Answer” on the post that helps you, and to click “Unmark as Answer” if a marked post does not actually answer your question. This can be beneficial to other community members reading the thread. Regards, Mike J. [MSFT] This
    posting is provided "AS IS" with no warranties, and confers no rights.
    That's a good one! Thanks for that.
    I've been scripting on KIX for some time, so here is mine, hope it helps to someone... (it's probably not the best, but it works)
    ========================================================================
    $RC=setoption("WOW64AlternateRegView","on") 
    $DPMkey = "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft Data Protection Manager\Agent\ClientProtection"
    $uservariable = "%userdomain%\%username%"
    If KeyExist ($DPMkey)
    $Userstring=ReadValue($DPMkey, "ClientOwners")
    If $Userstring == ""
    WriteValue($DPMkey,"ClientOwners", $uservariable, "REG_MULTI_SZ")
    ? "Key created"
    else
    If not instr($Userstring,$uservariable)
    $Userstring = "$Userstring,$uservariable"
    WriteValue($DPMkey,"ClientOwners", $Userstring, "REG_MULTI_SZ")
    EndIf
    Endif
    EndIf
    ==========================================================================
    The problem actually is that you still need to use an admin account to write on the registry, so ensure you configure it properly on the schedule task.
    In case you use a service account on the schedule task... the "$uservariable" will get populated with that account. As a work around to this... I changed it for the following line:
    =========================================================
    $uservariable = ReadValue("HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI", "LastLoggedOnSAMUser")
    =========================================================
    The only problem with that, is that key gets created/updated only if user gets logged phisically on that PC, but will not work for anyone connecting through RDP.

  • Realizing the benefits of End-User computing

    End-user computing is changing the way we manage and deploy our desktops, support mobile users, and secure company data by mitigating risk to the datacenter. 
    MicroAge has seen clients large and small begin to evaluate, implement, and realize the benefits achieved through EUC solutions like VMware Horizon View and Citrix XenDesktop.
    If you're interested in learning more about how EUC can benefit your organization, MicroAge is here to take you from proof of concept to design to implementation.  Let us know have we can help!
     http://bit.ly/1MumwHO
    This topic first appeared in the Spiceworks Community

    End-user computing is changing the way we manage and deploy our desktops, support mobile users, and secure company data by mitigating risk to the datacenter. 
    MicroAge has seen clients large and small begin to evaluate, implement, and realize the benefits achieved through EUC solutions like VMware Horizon View and Citrix XenDesktop.
    If you're interested in learning more about how EUC can benefit your organization, MicroAge is here to take you from proof of concept to design to implementation.  Let us know have we can help!
     http://bit.ly/1MumwHO
    This topic first appeared in the Spiceworks Community

  • Utilizing the Workspace for end users

    Trying to see how can I utilize the existing workspace for "end users" who are supposed to access the application, I have two questions:
    1- How to remove the extra regions, logos and etc.
    2- How to add link to the application
    Thanks,
    Mehr

    I'm not clear on your question, but I'm going to take a wild stab in the dark and think you would like to customise the workspace login
    http://www.grassroots-oracle.com/2013/02/modifying-apex-workspace-login-page.html
    Why not provide them the appropriate URL in the first place?

  • How to hide the columns at the end user level thru personalization

    Hi all
    how I can hide the columns that are displayed on the portal. Any personalize option for the end user? Any righ click or some thing?
    I am looking at hiding columns not while developing the iViews / Pages, But in the browsers as the end user.
    i can hide the columns what ever i want while creating the iViews for MDM data. but we cant provide the content administrator role to the end user for hiding the columns what ever they want. they want to hide the columns thru pesonalization option at the end user level.
    Can you please let me know whether we can able to hide the columns at the end user level thru personalization ?? is it posible with standard iViews??
    Regards
    Sunil

    Hi Sunil,
    I understood your requirement properly and seems valid and I tried this at my end but i didnt get the solution. Field list is not visible in Personalize option. I dont think it is possible with MDM standard iViews.
    I was thinking an alternative is if some how we manage to give the permissions to end user only on Result Set iView but if it would be possible it will not be a good design.
    Lets wait for some inputs from others.
    Regards,
    Jitesh Talreja

  • Unable to map the portal user with back end user through web dynpro coding

    Hi All,
    I 've a portal user which is mapped to back end user by  system in the portal.
    i 'm able to get the portal user from web dynpro application.
    But unable to get the mapped back end user
    this is my code
    String systemalias = "SAP_CRM_PROD";
    Map mapattr = new HashMap();
              //     IPrincipal principal = (IPrincipal) request.getUser();
    //   get user user mapping information
    IUserMappingData userMapping =
                   //(IUserMappingData) UMFactory.getUserMapping().getUserMappingData(systemalias, principal, mapattr);
                   (IUserMappingData) UMFactory.getUserMapping().getUserMappingData(systemalias,principal,mapattr );
    //                  For testing purposes only
                   //mappingData = userMapping;
                   HashMap map = new HashMap();
                   userMapping.enrich(map);
                   mappedPassword = map.get(UMAP_KEY_PASSWORD).toString(); //String "user"
                   mappedUserId = map.get(UMAP_KEY_USER).toString(); /
    following is the error reported .
    The project was not built since its classpath is incomplete. Cannot find the class file for javax.xml.soap.SOAPMessage. Fix the classpath then try rebuilding this project.
    please help.

    Hi Sanjay,
       request component need to be initialized before using it. Include these lines before ur code.
    IPortalComponentRequest request = (IPortalComponentRequest) this.getRequest();
    String mappedPassword = null;
    String mappedUserId = null;
    Also check these threads for ur help.
    Accessing Mapped Username / Password
    How to access user id and password via UserMapping ?
    Reward points for helpful answers.
    Regards,
    Harini S

  • End Users cannot log in to the ccmuser web page.

    Greetings,
    I have a Call Manager Business Edition that was synched with a customer's AD directory. However, the end users cannot log in to the ccmuser web page with either their AD password or the Call Manager end user PIN.
    Any suggestions?
    Thanks
    George

    Thanks for your reply, Aaron.
    All users are in the end user group.. I even created a new role/user group that gives users complete read/write access to all end user features. Still no go. I think it is an LDAP issue, but I'm confused because everything else works.

  • Best way of creating a report where end user can maintain names in groups

    I'm working on a project as a independent consultant for a company and I'm using Crystal Professional Reports version XI.
      I have a main report and a subreport that contains summary totals.  I'm going to link the two reports by a date parameter range.  For the subreport, the report is going to be grouped by four groups.  Each of the groups contain a list of names.  What would the best approach to give the end user who will be running the report on a daily basis to add or remove names for each of the groups when end user is prompted to run the report?
       I want to make it easy as possible for the end user to maintain this list in the sub report because of the following reasons: after the report is deployed,I will not be there on site to maintain it instead I will be available over the phone for support and the end user is the manager of the department and is not a Crystal reports developer or programmer. 
       I hope that made sense.  If not I can give more details.  Have a good day.
    Thanks for your help,
    Ting

    Well let me start by saying that maintaining hard coded lists in a report definition is a bad idea and should be avoided if at all possible.
    This of course means that it isn't always possible... In fact I have a few of my own reports that suffer from the same situation. Here is the way I handle it to make the list maintenance as easy and error free as possible.
    #1) I created a new Report Custom Function. Let's call it  NamesToGroups. The function will look like this... (Crystal Syntax)
    Function (stringVar PersonName)
    SELECT PersonName
    CASE
    "Gustavo Achong",
    "Catherine Abel",
    "Kim Abercrombie",
    "Humberto Acevedo",
    "Pilar Ackerman",
    "Frances Adams",
    "Margaret Smith",
    "Carla Adams" :
        "Name of Group 1"
    CASE
    "Jay Adams",
    "Ronald Adina",
    "Samuel Agcaoili",
    "James Aguilar",
    "Robert Ahlering",
    "François Ferrier",
    "Kim Akers",
    "Lili Alameda",
    "Amy Alberts" :
        "Name of Group 2"
    CASE
    "Alberto Baltazar",
    "Wayne Banack",
    "Darrell Banks",
    "Norma Barrera",
    "Gytis Barzdukas",
    "David Bartness",
    "Karel Bates" :
        "Name of Group 3"
    CASE"Donald Blanton",
    "Linda Burnett",
    "Michael Blythe",
    "Gabriel Bockenkamp",
    "Michael Bohling",
    "Eli Bowen",
    "Lester Bowman",
    "David Bradley" :
        "Name of Group 4"
    Default : "Unknown Name"
    Note that the list setup makes it easy to see who's in what group and makes it easy to add new people to the correct group...
    #2) Now you can simple use the function in a formula. Lets call it NameGroups and the formula would look like this...
    NamesToGroups({TableName.FullPersonName})
    #3) Now NameGroups is available for grouping or selection purposes or just to add as a formula on the design surface.
    #4) If you are using CRS or BOE the function can be saved to the repository for use in other reports as well
    Now any time a new name needs to be added, the user can access the "Report Custom Functions" are of the Formula Workshop and add the name to the function, which in turn, will be propagated through the rest of the report. It's also easy to see how the function is actually working so that new groups can also be easily added.
    HTH,
    Jason

  • GRC AC Filter for System in GRC AC End user Home

    Hi,
    I need to create a filter for system (for all user) in the ALV, from END USER HOME when try to select roles and system from Model User
    I see the instructions in the link:
    http://scn.sap.com/community/grc/blog/2013/09/04/customizing-access-request-and-approval-screens-in-grc-access-control
    But i try to open application GRAC_UIBB_END_USER_LOGIN from SE80 transacction, appears a error in the navigator.
    This is what I want to accomplish

    Hello Cristian,
    Try to add the below string at the end of the URL for which you are getting error.
    &SAP_CONFIG_MODE=X&OBJECT_ID=ACCREQ
    Hope it helps.
    Regards,
    Neeraj Agarwal

  • Training To End User on AA ,  AP.

    Hi,
    i need to give the Traing to End Users on AA & AP next week,
    can any one help me how do i start, from which topic,
    or send me any meterail for Training to End Users. what type of questions
    will we get from them, how do i answer & manage them.
    please help me, very urgent.
    i will assign points.

    Prabodh wrote:
    You should always state the Apex version. And this case, because this is related to authentication, the Authentication scheme you are using.
    Assuming that you are using the Apex Built-in Auth scheme, you can achieve this by using User Groups feature and the APEX_UTIL.CURRENT_USER_IN_GROUP API.
    Here are the high level steps:
    a. Apex Builder > Administration > Manage Users and Groups
    b. Create 2 users UAT1 and UAT2
    c. Create 2 Groups UAT1Group and UAT2 Group
    d. Assign UAT1 user to UAT1Group and UAT2 to UAT2Group
    e. On the Home page of both the applications create a "Before Page Header" Branch that goes back to the Login Page. Make this branch conditional.This does not work, because in APEX you can go into any page after login bypassing the home page (like this http://apex.oracle.com/pls/apex/f?p=46417:9 where 9 is not home page)
    So this branch will not run.
    f. In "A" application you want only UAT1 to access , so use PL/SQL Expression type of condition in the above created branch that has the following code
    return NOT APEX_UTIL.CURRENT_USER_IN_GROUP('UAT1Group')So the user UAT1 will return False and the branch will not execute, but for others it will return True and send the user to Login page, which is access denied.
    Similarly, make the branch in B application condition for UAT2Group.
    Regards,

  • L2 stack switch - to end-user devices

    Hi all,
    I came across a design in my project today and realize that there are 3 x L2 stack switches which will be connecting to end-user computers.
    According to the client, for end-user devices, he intend to just connect 1device/interface.
    Q1) I am wondering, in this design, the only intention is to increase the number of interfaces/ports , am i right ? as there is only 1 physical cable for each connected device.
    ==========================================================================================
    In the same design, there is 2 x L3 switches which are meant for core network connecting to servers computers. They are stacked as well.
    In this case, etherchannels are configured on the switches and servers which the 2 interfaces in 1 server are connecting to separate switches' interface in the stack.
    Q2) Can I check, for this kind of switch stacking setup, are the etherchannels configure as active, active or it can be configure as active,passive ? or it is switches and servers dependable ?
    Regards,
    Noob

    Hi Reza,
    Thanks for the reply.
    Q1) I am wondering, in this design, the only intention is to increase the number of interfaces/ports , am i right ? as there is only 1 physical cable for each connected device.
    That is correct.  The end devices (printers, PCs, laptops) usually have one physical cable and you can only connect them to one switch, but sometimes for mission critical environments engineers deploy multiple switches in case one of them goes out for any reason.
    What if in the event that 1 of the switch go down, as the switches are stacked, can i just plug out the cable @ interface let's say at switch1 fe0/1 and insert it into switch2 fe0/1 ? (provided it is not occupied)
    Q2) Can I check, for this kind of switch stacking setup, are the etherchannels configure as active, active or it can be configure as active,passive ? or it is switches and servers dependable ?
    If you issue "sh etherca summay" on the stack, it will show you the port number that are part of that etherchannel.  As for active or passive, usually the switch is configured as active and servers as passive but you can also configure both sides as active.
    Do you mean on the server side, only 1 port will be receiving/sending information, but on the switch side, each interface at each of the 2 switches is able to receive/send ?
    Regards,
    Noob

Maybe you are looking for