3.9.0
This commit is contained in:
@@ -39,7 +39,7 @@
|
||||
"blockExternalImagesTitle": "Block External Images",
|
||||
"blockExternalImagesTooltip": "When block external images is enabled, the app will prevent the download of images hosted on the Internet that are embedded in the message body. When set as not configured, the default app setting is set to Off.",
|
||||
"disableAddinsTitle": "Allow Add-ins",
|
||||
"disableAddinsTooltip": "By default, an App Protection Policy allows for users to utilize third-party add-ins, but can be used to block add-ins with the \"Sync policy managed app data with native apps\" setting. This app config setting operates independent of the App Protection Policy setting and enables organizations to define whether add-ins are available in the app.",
|
||||
"disableAddinsTooltip": "By default, an App Protection Policy allows users to utilize third-party add-ins but can be used to block add-ins with the \"Sync policy managed app data with native apps or add-ins\" setting. Configuring this setting to \"Off\" will block add-ins when the App Protection Policy setting is set to Allowed.",
|
||||
"discoverFeedTitle": "Discover Feed",
|
||||
"discoverFeedTooltip": "Discover Feed surfaces your most frequently accessed Office files. By default, this feed is enabled when Delve is enabled for the user. When set as not configured, the default app setting is set to On.",
|
||||
"enableSMIMETitle": "Enable S/MIME",
|
||||
@@ -53,7 +53,7 @@
|
||||
"nativeCalendarSyncMAMOnlyTitle": "Allow Calendar Sync",
|
||||
"nativeCalendarSyncMAMOnlyTooltip": "By default, an App Protection Policy allows for calendar synchronization to the native Calendar app, but can be used to block calendar sync availability. This setting operates independent of the App Protection Policy setting and enables organizations to define whether calendar sync is available for the work or school account.",
|
||||
"nativeCalendarSyncTitle": "Sync Calendars",
|
||||
"nativeCalendarSyncTooltip": "Configure whether users can sync their Outlook calendar to the native calendar app and database.",
|
||||
"nativeCalendarSyncTooltip": "By default, an App Protection Policy allows for calendar synchronization to the native Calendar app but can be used to block calendar sync availability with the \"Sync policy managed app data with native apps or add-in\" setting. Configuring this setting to \"Off\" will block calendar synchronization when the App Protection Policy setting is set to Allowed.",
|
||||
"playMyEmailsTitle": "Play My Emails",
|
||||
"playMyEmailsTooltip": "The Play My Emails feature is not enabled by default in the app, but it is promoted to eligible users via a banner in the inbox. When set to Off, this feature will not be promoted to eligible users in the app. Users can choose to manually enable Play My Emails from within the app, even when this feature is set to Off. When set as Not configured, the default app setting is On and the feature will be promoted to eligible users.",
|
||||
"signAllEmails": "Sign all emails",
|
||||
@@ -587,7 +587,8 @@
|
||||
"scriptFileLabel": "Select your discovery script"
|
||||
},
|
||||
"PremiumBanner": {
|
||||
"label": "Custom Compliance is currently offered in preview. When it becomes generally available, you can add it for an additional cost to the licensing options that include Microsoft Endpoint Manager or Intune."
|
||||
"customComplianceToolTip": "When enabled, devices must be compliant according to custom rules defined in a JSON file based on custom data returned from a discovery PowerShell script.",
|
||||
"label": "Custom Compliance is currently offered in preview. When it becomes generally available, you can add it for an additional cost to the licensing options that include Microsoft Intune."
|
||||
},
|
||||
"ScriptPicker": {
|
||||
"objectName": "Script",
|
||||
@@ -642,9 +643,6 @@
|
||||
"windowsPC": "Windows PC"
|
||||
},
|
||||
"AppInformationTab": {
|
||||
"Error": {
|
||||
"multipleChildApps": "A macOS LOB app can only be installed as managed when the uploaded package contains a single app."
|
||||
},
|
||||
"Info": {
|
||||
"AppStoreUrl": {
|
||||
"android": "Enter the link to the app listing in Google Play store. For example:",
|
||||
@@ -653,12 +651,12 @@
|
||||
"microsoftStoreLink": "https://go.microsoft.com/fwlink/?linkid=2115228",
|
||||
"microsoftStoreLinkText": "Add Microsoft Store apps (legacy) to Microsoft Intune",
|
||||
"windows": "Enter the link to the app listing in the Microsoft Store. For example:",
|
||||
"windowsLink": "https://www.microsoft.com/en-us/p/microsoft-to-do-lists-tasks-reminders/9nblggh5r558"
|
||||
"windowsLink": "https://www.microsoft.com/p/microsoft-to-do-lists-tasks-reminders/9nblggh5r558"
|
||||
},
|
||||
"appPackageFile": "A file that contains your app in a format that can be sideloaded on a device. Valid package types include: Android (.apk), iOS (.ipa), macOS (.pkg), Windows (.msi, .appx, .appxbundle, .msix, and .msixbundle).",
|
||||
"applicableDeviceType": "Select the device types that can install this app.",
|
||||
"category": "Categorize the app to make it easier for users to sort and find in Company Portal. You can choose multiple categories.",
|
||||
"categoryLink": "https://docs.microsoft.com/en-us/intune/apps/apps-add#create-and-edit-categories-for-apps",
|
||||
"categoryLink": "https://docs.microsoft.com/intune/apps/apps-add#create-and-edit-categories-for-apps",
|
||||
"description": "Help your device users understand what the app is and/or what they can do in the app. This description will be visible to them in Company Portal.",
|
||||
"developer": "The name of the company or Individual that developed the app. This information will be visible to people signed into the admin center.",
|
||||
"displayVersion": "The version of the app. This information will be visible to users in the Company Portal.",
|
||||
@@ -677,7 +675,7 @@
|
||||
"publisher": "The name of the developer or company that distributes the app. This information will be visible to users in Company Portal.",
|
||||
"selectApp": "Search the App Store for iOS store apps that you want to deploy with Intune.",
|
||||
"useManagedBrowser": "If required, when a user opens the web app, it will open in an Intune-protected browser such as Microsoft Edge or Intune Managed Browser. This setting applies to both iOS and Android devices.",
|
||||
"useManagedBrowserLink": "https://docs.microsoft.com/en-us/intune/apps/app-configuration-managed-browser",
|
||||
"useManagedBrowserLink": "https://docs.microsoft.com/intune/apps/app-configuration-managed-browser",
|
||||
"win32AppPackageFile": "A file that contains your app in a format that can be sideloaded on a device. Valid package type: .intunewin.",
|
||||
"winGetStoreSelectApp": "Search the Microsoft Store app (new) for store apps that you want to deploy with Intune."
|
||||
},
|
||||
@@ -706,10 +704,16 @@
|
||||
"appSharingToLevel4": "{0}: Do not allow sending org data to any app",
|
||||
"appSharingToLevel5": "{0}: Only allow transfer only to other policy managed apps and file transfer to other MDM managed apps on enrolled devices",
|
||||
"appSharingToLevel6": "{0}: Allow transfer only to other policy managed apps and filter OS Open-in/Share dialogs to only display policy managed apps",
|
||||
"assignmentFilterEdit1": "If you apply assignment filters to this policy, the 'Device Management Type' property will apply in addition to the values specified for 'Target to apps on all device types' and 'Device types' on the 'Apps' page.",
|
||||
"assignmentFilterEdit2": "Learn more about assigning App Protection policies.",
|
||||
"conditionalEncryption1": "Select {0} to disable app encryption for internal app storage when device encryption is detected on an enrolled device.",
|
||||
"conditionalEncryption2": "Note: Intune can only detect device enrollment with Intune MDM. External app storage will still be encrypted to ensure data cannot be accessed by unmanaged applications.",
|
||||
"contactSyncMac": "If disabled, apps cannot save contacts to the native address book.",
|
||||
"contactsSync": "Choose <b>Block</b> to prevent policy managed apps from saving data to the device's native apps (like Contacts, Calendar and widgets), or to prevent the use of add-ins within the policy managed apps. If you choose <b>Allow</b>, the policy managed app can save data to the native apps or use add-ins, if those features are supported and enabled within the policy managed app. <br /> <br /> Apps may provide additional configuration capability with app configuration policies. For more information, see the app's documentation.",
|
||||
"deviceTypeTargetingCreate1": "Device type targeting has moved to the Assignments step in policy creation.",
|
||||
"deviceTypeTargetingEdit1": "If you apply assignment filters to this policy, the 'Device Management Type' property will apply in addition to the values specified for 'Target to apps on all device types' and 'Device types' on the 'Apps' page.",
|
||||
"deviceTypeTargetingEdit2": "To edit device management type targeting, reset 'Target to apps on all device types' = 'Yes'. Then create a MAM assignment filter with the desired values for 'Device Management Type'.",
|
||||
"deviceTypeTargetingHasMoved": "Learn more about assigning App Protection Policies",
|
||||
"encryptionAndroid1": "For apps that are associated with an Intune mobile application management policy, encryption is provided by Microsoft. Data is encrypted synchronously during file I/O operations according to the setting in the mobile application management policy. Managed apps on Android use AES-128 encryption in CBC mode utilizing the platform cryptography libraries. The encryption method is not FIPS 140-2 compliant. SHA-256 encryption is supported as an explicit instruction using the SigAlg parameter and will only work on devices 4.2 and above. Content on the device storage is always be encrypted.",
|
||||
"encryptionAndroid2": "When you require encryption in your app policy, the end-user is required to setup and use a PIN to access their device. If there is not a PIN set up for device access, the apps will not launch and the end-user will instead see a message, which says, “Your company has required that you must first enable a device PIN to access this application.\"",
|
||||
"encryptionMac1": "For apps that are associated with an Intune mobile application management policy, encryption is provided by Microsoft. Data is encrypted synchronously during file I/O operations according to the setting in the mobile application management policy. Managed apps on Mac use AES-128 encryption in CBC mode utilizing the platform cryptography libraries. The encryption method is not FIPS 140-2 compliant. SHA-256 encryption is supported as an explicit instruction using the SigAlg parameter and will only work on devices 4.2 and above. Content on the device storage is always be encrypted.",
|
||||
@@ -879,7 +883,7 @@
|
||||
},
|
||||
"HybridAzureADSkipConnectivityCheck": {
|
||||
"infoBalloon": "The Autopilot Hybrid Azure AD join flow will continue even if it does not establish domain controller connectivity during OOBE.",
|
||||
"label": "Skip AD connectivity check (preview)"
|
||||
"label": "Skip AD connectivity check"
|
||||
},
|
||||
"accountType": "User account type",
|
||||
"accountTypeInfo": "Specify whether users are administrators or standard users on the device. Note that this setting does not apply to Global Administrator or Company Administrator accounts. These accounts cannot be standard users because they have access to all administrative features in Azure AD.",
|
||||
@@ -1030,6 +1034,7 @@
|
||||
"v13": "iOS 13.0",
|
||||
"v14": "iOS 14.0",
|
||||
"v15": "iOS 15.0",
|
||||
"v16": "iOS 16.0",
|
||||
"v8": "iOS 8.0",
|
||||
"v9": "iOS 9.0"
|
||||
},
|
||||
@@ -1066,8 +1071,14 @@
|
||||
"release1909": "Windows 10 1909",
|
||||
"release2004": "Windows 10 2004",
|
||||
"release21H1": "Windows 10 21H1",
|
||||
"release21H2": "Windows 10 21H2",
|
||||
"release22H2": "Windows 10 22H2",
|
||||
"release2H20": "Windows 10 20H2"
|
||||
},
|
||||
"V11Release": {
|
||||
"release21H2": "Windows 11 21H2",
|
||||
"release22H2": "Windows 11 22H2"
|
||||
},
|
||||
"v10": "Windows 10.0",
|
||||
"v80": "Windows 8.0",
|
||||
"v81": "Windows 8.1"
|
||||
@@ -1079,7 +1090,7 @@
|
||||
},
|
||||
"EnrollmentStatusScreen": {
|
||||
"Apps": {
|
||||
"allowNonBlockingAppInstallation": "Only fail selected blocking apps in technician phase",
|
||||
"allowNonBlockingAppInstallation": "Only fail selected blocking apps in technician phase (preview)",
|
||||
"apps": "apps",
|
||||
"appsListName": "Application list",
|
||||
"blockingApps": "Blocking apps",
|
||||
@@ -1098,6 +1109,7 @@
|
||||
"version": "Version"
|
||||
},
|
||||
"SearchBox": {
|
||||
"ariaLabel": "Search apps",
|
||||
"placeHolder": "Search by name or publisher"
|
||||
},
|
||||
"allowToUseToggle": "Allow users to use device if installation error occurs",
|
||||
@@ -1108,7 +1120,7 @@
|
||||
"customMessageTextBox": "Error message",
|
||||
"customMessageToggle": "Show custom message when time limit or error occurs",
|
||||
"enableForAutopilotOnlyToggle": "Only show page to devices provisioned by out-of-box experience (OOBE)",
|
||||
"installQualityUpdatesToggle": "Install Windows quality updates (might restart the device)",
|
||||
"installQualityUpdatesToggle": "Install Windows quality updates (might restart the device) (preview)",
|
||||
"progressToggle": "Show app and profile configuration progress",
|
||||
"resetToggle": "Allow users to reset device if installation error occurs",
|
||||
"timeout": "Show an error when installation takes longer than specified number of minutes"
|
||||
@@ -1927,6 +1939,8 @@
|
||||
"allOtherUpdatesBehaviorName": "All other updates (OS, built-in apps)",
|
||||
"allowActivationLockWhenSupervisedDescription": "Activation Lock makes it harder for a lost or stolen device to be reactivated.",
|
||||
"allowActivationLockWhenSupervisedName": "Allow activation lock",
|
||||
"allowAllAccounts": "Allow all accounts types",
|
||||
"allowAllAccountsExceptGoogle": "Allow all accounts types, except Google accounts (default)",
|
||||
"allowAllCaptiveNetworkPluginsName": "Allow traffic from non-native captive networking apps to pass outside VPN",
|
||||
"allowAllTrustedAppsSideloading": "Trusted app installation",
|
||||
"allowAllTrustedAppsSideloadingDescription": "Specifies whether apps from Appx packages signed with a trusted certificate can be sideloaded.",
|
||||
@@ -1978,6 +1992,9 @@
|
||||
"androidDeviceOwnerAlwaysOnVpnClientDescription": "The specified VPN client must be installed on the device, and it must support per-app VPN; otherwise, an error will occur. Note that you will need to approve the app in the Managed Google Play Store, sync the app to Intune, and deploy it in order for it to be installed.",
|
||||
"androidDeviceOwnerCustomPasswordDescription": "Create a device passcode for dedicated devices only. Can be 4-16 characters and contain numbers, letters, and special characters.",
|
||||
"androidDeviceOwnerCustomPasswordName": "Custom passcode",
|
||||
"androidDeviceOwnerLocateDeviceLostModeEnabledDescription": "Allow admin-initiated geolocation of lost or stolen devices. When you allow this, end users will receive a one-time notification stating that Intune has been granted location permissions.",
|
||||
"androidDeviceOwnerLocateDeviceName": "Locate device",
|
||||
"androidDeviceOwnerLocateDeviceUserlessDisabledDescription": "Block admin-initiated geolocation of lost or stolen devices.",
|
||||
"androidElevenAndBelowPasswordHeader": "Android 11 and earlier",
|
||||
"androidElevenAndBelowPasswordHeaderDescription": "These settings work for devices running Android 11 or earlier.",
|
||||
"androidEnterpriseAlwaysOnVpnClientName": "VPN client",
|
||||
@@ -2344,7 +2361,7 @@
|
||||
"blockAccountModificationName": "Block modification of account settings",
|
||||
"blockAddNewPrintersDescription": "Prevent user installation of additional printers from printers settings.",
|
||||
"blockAddNewPrintersName": "Add new printers",
|
||||
"blockAddingAccountsDescription": "Prevent end users from adding or removing accounts in the work profile.",
|
||||
"blockAddingAccountsDescription": "Manage whether users can add or remove work profile accounts in the Settings app. Note that this does not affect the accounts that are automatically added in Settings when a user enrolls, or accounts entered directly into work apps.",
|
||||
"blockAddingAccountsName": "Add and remove accounts",
|
||||
"blockAdultContentInItunesDescription": "Block explicit iTunes music, podcast, or news content. For supervised devices as of iOS 13.0.",
|
||||
"blockAdultContentInItunesName": "Block playback of explicit music, podcast, and iTunes U",
|
||||
@@ -2360,6 +2377,7 @@
|
||||
"blockAirPrintiBeaconDiscoveryDescriptionMacOS": "Blocking prevents malicious AirPrint Bluetooth beacons phishing for network traffic",
|
||||
"blockAirPrintiBeaconDiscoveryNameIOS": "Block iBeacon discovery of AirPrint printers",
|
||||
"blockAirPrintiBeaconDiscoveryNameMacOS": "Block discovery of AirPrint printers using iBeacons",
|
||||
"blockAllAccounts": "Block all accounts types",
|
||||
"blockAllCookiesOption": "Block all cookies",
|
||||
"blockAllDataSharingBetweenWorkAndPersonalProfilesOption": "Block all sharing between profiles",
|
||||
"blockAndroidBluetoothDescription": "Disable Bluetooth",
|
||||
@@ -2606,7 +2624,7 @@
|
||||
"blockNonMicrosoftAccountName": "Non-Microsoft account",
|
||||
"blockNotificationsModificationDescription": "Block modification of notification settings.",
|
||||
"blockNotificationsModificationName": "Block modification of notifications settings",
|
||||
"blockNotificationsWhileDeviceLockedDescription": "This setting controls whether notifications from apps in the work profile are visible when the device is locked. Recommended Value: Yes",
|
||||
"blockNotificationsWhileDeviceLockedDescription": "This setting controls whether notifications from apps in the work profile are visible on the lock screen.",
|
||||
"blockNotificationsWhileDeviceLockedName": "Work profile notifications while device locked",
|
||||
"blockNotificationsWhileLockedName": "Block Notification Center access in lock screen",
|
||||
"blockOneDriveFileSyncDescription": "Block OneDrive file sync",
|
||||
@@ -3412,6 +3430,10 @@
|
||||
"domain": "domain added",
|
||||
"domainAccountOption": "Domain account",
|
||||
"domainActionName": "Domain action",
|
||||
"domainAllowListDescription": "Further control or limit the Google accounts added in the work profile by manually adding or importing a list of allowed domains using format like \"contoso.com\". If you don't add anything, any Google account can be added to the work profile.",
|
||||
"domainAllowListName": "Google domain allow-list",
|
||||
"domainAllowListTableEmptyValueExample": "Enter a domain",
|
||||
"domainAllowListTableName": "Domain",
|
||||
"domainAuthorizedAppRulesSummaryLabel": "Authorized application Microsoft Defender Firewall rules from the local store (Domain networks)",
|
||||
"domainFirewallEnabledSummaryLabel": "Microsoft Defender Firewall (Domain networks)",
|
||||
"domainGlobalRulesSummaryLabel": "Global port Microsoft Defender Firewall rules from the local store (Domain networks)",
|
||||
@@ -3744,7 +3766,7 @@
|
||||
"endTimeName": "End time",
|
||||
"endTimeUtc": "End time (UTC)",
|
||||
"endpointSecurityExtensionsAllowedOption": "Endpoint security extensions",
|
||||
"enforcedSoftwareUpdateDelayDescription": "Specify the number of days (1-90) to delay the default visibility of all software updates. Available for devices running macOS versions 10.13.4 and later.",
|
||||
"enforcedSoftwareUpdateDelayDescription": "Specify the number of days (1-90) to delay the default visibility of all software updates. Available for devices running iOS 11.3 and later, and macOS 10.13.4 and later.",
|
||||
"enforcedSoftwareUpdateDelayEmptyValue": "30",
|
||||
"enforcedSoftwareUpdateDelayInDaysDescription": "This setting does not impact any scheduled updates from other settings in this profile. It represents days before software updates are visible to end users after release.",
|
||||
"enforcedSoftwareUpdateDelayInDaysName": "Delay visibility of software updates to end users with no change to scheduled updates (days)",
|
||||
@@ -4057,6 +4079,8 @@
|
||||
"fullDomainNameOption": "Full domain name",
|
||||
"fullOption": "Optional",
|
||||
"fullScanOption": "Full scan",
|
||||
"fullyManagedAndCorporateOwnedWorkProfileAndroidEnrollmentTypesHeaderDescription": "These settings only work for fully managed and corporate-owned work profile devices.",
|
||||
"fullyManagedAndCorporateOwnedWorkProfileAndroidEnrollmentTypesHeaderName": "Fully managed and corporate-owned work profile devices",
|
||||
"fullyManagedAndDedicatedAndroidEnrollmentTypesHeaderDescription": "These settings only work for fully managed and dedicated devices.",
|
||||
"fullyManagedAndDedicatedAndroidEnrollmentTypesHeaderName": "Fully managed and dedicated devices",
|
||||
"gameCenterBlockedMacDescription": "Yes disables Game Center, and the Game Center icon is removed from the Home screen. Available for devices running macOS versions 10.13 or later.",
|
||||
@@ -4158,7 +4182,7 @@
|
||||
"iOSEduStudentCertPickerDescription": "Configure trusted root and PKCS#12 certificates for the student device certificates type you choose.",
|
||||
"iOSEduStudentScenario": "Student device certificates type",
|
||||
"iOSEduTeacherDescription": "Configure trusted root and PKCS#12 certificates for teachers.",
|
||||
"iOSMacPasswordExpirationInDaysEmptyValueKey": "Enter number of days (1-65535)",
|
||||
"iOSMacPasswordExpirationInDaysEmptyValueKey": "Enter number of days (1-730)",
|
||||
"iOSRequirePasswordName": "Require password",
|
||||
"iPAddressOrFQDNColumn": "IP address or FQDN",
|
||||
"iPRangeAddressTypeName": "IP address type",
|
||||
@@ -4195,6 +4219,7 @@
|
||||
"inboundConnectionsName": "Default action for inbound connections",
|
||||
"inboundNotificationsDescription": "Block notifications from displaying to users when an application is blocked from listening on a port.",
|
||||
"inboundNotificationsName": "Inbound notifications",
|
||||
"inboundOption": "Inbound",
|
||||
"inclusionAppListColumn": "App to include",
|
||||
"incorrectPortNumber": "Incorrect or missing port number",
|
||||
"individualEdgeBrowserSettingsName": "Individual Microsoft Edge settings",
|
||||
@@ -4688,6 +4713,8 @@
|
||||
"lockScreenMessageLearnMoreLink": "https://docs.microsoft.com/en-us/mem/intune/configuration/device-restrictions-android-for-work",
|
||||
"lockScreenMessageLearnMoreText": "Learn more about lock screen messages. ",
|
||||
"lockScreenMessageLengthValidation": "Input can't exceed 4096 characters.",
|
||||
"lockScreenMessageMessageInputValidation": "Lock screen message's Message cannot be empty",
|
||||
"lockScreenMessageMessageLocaleValidation": "Lock screen message's Language cannot be empty",
|
||||
"lockScreenMessageName": "Lock screen message",
|
||||
"lockScreenMessagesSummaryKey": "Lock Screen Message",
|
||||
"lockScreenTimeoutInSecondsDescription": "Set the duration (in seconds) from the screen locking to the screen turning off for Windows 10 Mobile devices. Supported values are 11-1800.",
|
||||
@@ -4875,7 +4902,7 @@
|
||||
"macOSSoftwareUpdatePolicyScheduleSettingsName": "Update policy schedule settings",
|
||||
"macOSSoftwareUpdatePolicyScheduleTypeDescription": "When updates will be available to install. Updates made during or outside of scheduled times require additional input.",
|
||||
"macOSSoftwareUpdatePolicyScheduleTypeName": "Schedule type",
|
||||
"macOSSoftwareUpdatePolicySectionDescription": "Create a profile to force assigned devices to automatically install the latest macOS updates. These settings determine how and when software updates deploy. This profile doesn't prevent users from updating the OS manually. Updates will only apply to devices enrolled through Apple's Automated Device Enrollment (with ABM or ASM).",
|
||||
"macOSSoftwareUpdatePolicySectionDescription": "Create a profile to force assigned devices to automatically install the latest macOS updates. These settings determine how and when software updates deploy. This profile doesn't prevent users from updating the OS manually. Updates will only apply to supervised devices.",
|
||||
"macOSSoftwareUpdatePolicySectionDescriptionLearnMoreText": "Learn More",
|
||||
"macOSSoftwareUpdatePolicySupervisedLearnMoreText": "Learn More",
|
||||
"macOSSoftwareUpdatePolicySupervisedName": "Create a profile to force assigned devices to automatically install the latest macOS updates. These settings determine how and when software updates deploy. This profile doesn't prevent users from updating the OS manually. Updates will only apply to supervised devices.",
|
||||
@@ -4905,6 +4932,8 @@
|
||||
"managedPasteboardRequiredDescription": "Open-in management controls how people share data between unmanaged and managed apps. If you configure this setting, Intune will enforce copy/paste restrictions based on how you configured Block viewing corporate documents in unmanaged apps and Block viewing non-corporate documents in corporate apps.",
|
||||
"managedPasteboardRequiredName": "Allow copy/paste to be affected by managed open-in",
|
||||
"manualOption": "Manual",
|
||||
"maxUserDeferralsDescription": "Enter the maximum number of user deferrals allowed, after which a forced update will occur on the device. Available for devices running macOS versions 12 and later.",
|
||||
"maxUserDeferralsName": "Maximum user deferrals",
|
||||
"mediaContentRatingAppsAgesAbove12Option": "12+",
|
||||
"mediaContentRatingAppsAgesAbove17Option": "17+",
|
||||
"mediaContentRatingAppsAgesAbove4Option": "4+",
|
||||
@@ -5345,6 +5374,7 @@
|
||||
"originalProfileTypeTitle": "Original Profile Type:",
|
||||
"outboundConnectionsDescription": "Configure the default action firewall performs on outbound connections. This setting will get applied to Windows version 1809 and above.",
|
||||
"outboundConnectionsName": "Default action for outbound connections",
|
||||
"outboundOption": "Outbound",
|
||||
"pACHeading": "Protected Access Credential (PAC) Settings",
|
||||
"pAPName": "Unencrypted password (PAP)",
|
||||
"pEAPName": "PEAP",
|
||||
@@ -5486,6 +5516,8 @@
|
||||
"printersColumns": "e.g. printer DNS name",
|
||||
"printersDescription": "Automatically provision printers based on their network host names. This setting does not support shared printers.",
|
||||
"printersName": "Printers",
|
||||
"priorityDescription": "The scheduling priority for downloading and preparing the requested update. This is only supported for minor OS updates (macOS 12.x to 12.y). Available in macOS 12.3 and later.",
|
||||
"priorityName": "Priority",
|
||||
"privacyAutoAcceptPairingAndConsentPromptsDescription": "Allow automatic acceptance of the pairing and privacy user consent dialogs when launching apps.",
|
||||
"privacyAutoAcceptPairingAndConsentPromptsName": "Automatic acceptance of the pairing and privacy user consent prompts",
|
||||
"privacyBlockInputPersonalizationDescription": "Block usage of cloud-based speech services for Cortana, dictation or Windows Store apps. If not configured, Microsoft may use user voice data to improve cloud speech services.",
|
||||
@@ -6180,7 +6212,7 @@
|
||||
"softwareUpdateMajorOSDeferredInstallDelayName": "Delay visibility of major OS software updates",
|
||||
"softwareUpdateMinorOSDeferredInstallDelayDescription": "Specify the number of days (1-90) to delay visibility of minor OS software updates. This value takes precedence over the default visibility value. Available for devices running macOS versions 11.3 and later.",
|
||||
"softwareUpdateMinorOSDeferredInstallDelayName": "Delay visibility of minor OS software updates",
|
||||
"softwareUpdateNonOSDeferredInstallDelayDescription": "Specify the number of days (1-90) to delay visibility of non-OS software updates (such as Safari updates). This value takes precedence over the default visibility value. Available for devices running macOS versions 11.0 and later.",
|
||||
"softwareUpdateNonOSDeferredInstallDelayDescription": "Specify the number of days (1-90) to delay visibility of non-OS software updates (such as Safari updates). This value takes precedence over the default visibility value. Available for devices running macOS versions 11.3 and later.",
|
||||
"softwareUpdateNonOSDeferredInstallDelayName": "Delay visibility of non-OS software updates",
|
||||
"specificDomainsOption": "Specific search domains",
|
||||
"specificSSIDsOption": "Specific SSIDs",
|
||||
@@ -6408,6 +6440,8 @@
|
||||
"trafficRuleAppName": "App",
|
||||
"trafficRuleAppTypeName": "App type",
|
||||
"trafficRuleClaimsName": "Claim",
|
||||
"trafficRuleDirectionDescription": "Specify whether the rule applies to inbound traffic or outbound traffic.<br>\n <br>\n Inbound = The rule applies to all inbound traffic.\n<br>\n<br>\n Outbound = The rule applies to all outbound traffic.\n ",
|
||||
"trafficRuleDirectionName": "Direction",
|
||||
"trafficRuleRoutingPolicyTypeDescription": "Choose between split tunnel and force tunnel.<br>\n <br>\n Split tunnel = only the traffic meant for the VPN interface (as determined by the networking stack) goes over the interface. Internet traffic can continue to go over other interfaces.\n<br>\n<br>\n Force tunnel = all IP traffic must go through the VPN interface only (for this traffic rule).\n<br>\n<br>\n Applicable only when this rule is associated with an app.\n ",
|
||||
"trafficRuleRoutingPolicyTypeName": "Rule type",
|
||||
"trueOption": "True",
|
||||
@@ -6835,11 +6869,12 @@
|
||||
"webBrowserCookiesAllowAll": "Allow all cookies, and allow cross site tracking",
|
||||
"webBrowserCookiesPreventAndBlock": "Block all cookies, and block cross site tracking",
|
||||
"webBrowserCookiesPreventCrossSite": "Allow all cookies, and block cross site tracking",
|
||||
"webContentFilterBlackListedUrlExample": "e.g. http://www.contoso.com",
|
||||
"webContentFilterBlockedUrlExample": "e.g. http://www.contoso.com",
|
||||
"webContentFilterBlockedUrlsPlural": "URLs blocked",
|
||||
"webContentFilterBlockedUrlsSingular": "URL blocked",
|
||||
"webContentFilterBookmarkPathExample": "e.g. /Technology/MDM",
|
||||
"webContentFilterBookmarkTitleExample": "e.g. Microsoft",
|
||||
"webContentFilterPermittedUrlExample": "e.g. http://microsoft.com",
|
||||
"webContentFilterPermittedUrlsPlural": "URLs permitted",
|
||||
"webContentFilterPermittedUrlsSingular": "URL permitted",
|
||||
"webContentFilterTypeBlockAllUrlsHeaderName": "By selecting this option you block access to all URLs. User will not be able to access any website from their iOS device.",
|
||||
@@ -6853,20 +6888,19 @@
|
||||
"webContentFilterTypeConfigureUrlsOption": "Configure URLs",
|
||||
"webContentFilterTypeDescription": "The filtering mechanism that would be employed in determining whether a URL is accessible or not. You can choose to use Apple’s AutoFilter or specify the exact list of URLs or block all URLs.",
|
||||
"webContentFilterTypeName": "Filter Type",
|
||||
"webContentFilterTypePermittedBookmarkUrlsTableDescription": "For each URL provide the bookmark path to better organize the URLs. If no bookmark path provided, the bookmark is added to the default bookmark’s directory.",
|
||||
"webContentFilterTypePermittedUrlsColumnBookmarkPathName": "Bookmark Path",
|
||||
"webContentFilterTypePermittedUrlsColumnName": "URL",
|
||||
"webContentFilterTypePermittedUrlsColumnTitleName": "Title",
|
||||
"webContentFilterTypePermittedUrlsColumnUrlName": "URL",
|
||||
"webContentFilterTypePermittedUrlsDescription": "Use this filtering system to explicitly allow URLs that bypass the Apple’s built in AutoFilter. URLs added here will be allowed access even if they might get blocked by the Apple AutoFilter.",
|
||||
"webContentFilterTypePermittedUrlsHeaderName": "These URLs are added to the browser’s bookmarks, and the user is not allowed to visit any sites other than these. This is the most stringent method of filtering web content – use this only if you know the exact list of URLs that can be accessed by users.",
|
||||
"webContentFilterTypePermittedUrlsLinkTextName": "Learn more about URLs added automatically in this filter type",
|
||||
"webContentFilterTypePermittedUrlsName": "Permitted URLs",
|
||||
"webContentFilterTypePermittedUrlsOption": "Specific websites only",
|
||||
"webContentFilterTypePermittedUrlsTableDescription": "Specifies the URLs that can be accessible regardless of the default automatic filtering rules set by Apple.",
|
||||
"webContentFilterTypePermittedUrlsTableName": "Permitted URLs",
|
||||
"webContentFilterTypeWhitelistedUrlsColumnBookmarkPathName": "Bookmark Path",
|
||||
"webContentFilterTypeWhitelistedUrlsColumnTitleName": "Title",
|
||||
"webContentFilterTypeWhitelistedUrlsColumnUrlName": "URL",
|
||||
"webContentFilterTypeWhitelistedUrlsHeaderName": "These URLs are added to the browser’s bookmarks, and the user is not allowed to visit any sites other than these. This is the most stringent method of filtering web content – use this only if you know the exact list of URLs that can be accessed by users.",
|
||||
"webContentFilterTypeWhitelistedUrlsLinkTextName": "Learn more about URLs added automatically in this filter type",
|
||||
"webContentFilterTypeWhitelistedUrlsOption": "Specific websites only",
|
||||
"webContentFilterTypeWhitelistedUrlsTableDescription": "For each URL provide the bookmark path to better organize the URLs. If no bookmark path provided, the bookmark is added to the default bookmark’s directory.",
|
||||
"webContentFilterTypeWhitelistedUrlsTableName": "Specific websites only",
|
||||
"webContentFilterWhiteListedUrlExample": "e.g. http://microsoft.com",
|
||||
"webContentFilterTypeSpecificUrlsTableName": "Specific websites only",
|
||||
"webRtcBlockLocalhostIpAddressDescription": "User's localhost IP address is displayed when making phone calls using the web RTC protocol. Select No, to hide.",
|
||||
"webRtcBlockLocalhostIpAddressName": "Show WebRTC localhost IP address",
|
||||
"wednesday": "Wednesday",
|
||||
@@ -7411,6 +7445,8 @@
|
||||
"clientAppPolicyDefault": "No policies",
|
||||
"clientAppPolicyPlural": "{0} policies",
|
||||
"clientAppPolicySingular": "{0} policy",
|
||||
"clockInClockOutNotes": "<p><b>Notes:</b></p>\n<ul type=\"disc\">\n <li>Please refer to <b>link to quiet time docs – blocking section</b> for more information on which apps this setting can be applied to.</li>\n <li>This setting does not have capability to mute notifications. To configure settings for muting notifications, please refer to <b>link to quiet time – muting docs</b>.</li>\n</ul>",
|
||||
"clockedOutAccount": "Non-working time",
|
||||
"closeText": "Close",
|
||||
"columns": "Columns",
|
||||
"columnsApplied": "{0} columns applied",
|
||||
@@ -7485,7 +7521,7 @@
|
||||
"deviceConditionsInfoParagraph2": "Similar device based settings can be configured for enrolled devices.",
|
||||
"deviceConditionsInfoParagraph2LinkText": "Learn more about configuring device compliance settings for enrolled devices.",
|
||||
"deviceId": "Device ID",
|
||||
"deviceLockComplexityValidationFailureNotes": "<p><b>Notes:</b></p>\n<ul type=\"disc\">\n <li>The device lock can require a password complexity of: LOW, MEDIUM, or HIGH targeted to Android 11+. For devices operating on Android 10 and earlier, setting a complexity value of Low/Medium/High will default to the expected behavior for \"Low Complexity\".</li>\n <li>The password definitions below are subject to change. Please refer to <a href='https://developer.android.com/reference/android/app/admin/DevicePolicyManager#getPasswordComplexity%28%29'>DevicePolicyManager|Android Developers</a> for the most updated definitions of the different password complexity levels.</li>\n</ul>\n\n<p><b>Low</b></p>\n<ul type=\"disc\">\n <li>Password can be a pattern or PIN with repeating (4444) or ordered (1234, 4321, 2468) sequences.</li>\n</ul>\n\n<p><b>Medium</b></p>\n<ul type=\"disc\">\n <li>PIN with no repeating (4444) or ordered (1234, 4321, 2468) sequences with a minimum length of at least 4 characters</li>\n <li>Alphabetic passwords with a minimum length of at least 4 characters</li>\n <li>Alphanumeric passwords with a minimum length of at least 4 characters</li>\n</ul>\n\n<p><b>High</b></p>\n<ul type=\"disc\">\n <li>PIN with no repeating (4444) or ordered (1234, 4321, 2468) sequences with a minimum length of at least 8 characters</li>\n <li>Alphabetic passwords with a minimum length of at least 6 characters</li>\n <li>Alphanumeric passwords with a minimum length of at least 6 characters</li>\n</ul>\n<p></p>",
|
||||
"deviceLockComplexityValidationFailureNotes": "<p><b>Notes:</b></p>\n<ul type=\"disc\">\n <li>The device lock can require a password complexity of: LOW, MEDIUM, or HIGH targeted to Android 12+. For devices operating on Android 11 and earlier, setting a complexity value of Low/Medium/High will default to the expected behavior for \"Low Complexity\".</li>\n <li>The password definitions below are subject to change. Please refer to <a href='https://developer.android.com/reference/android/app/admin/DevicePolicyManager#getPasswordComplexity%28%29'>DevicePolicyManager|Android Developers</a> for the most updated definitions of the different password complexity levels.</li>\n</ul>\n\n<p><b>Low</b></p>\n<ul type=\"disc\">\n <li>Password can be a pattern or PIN with repeating (4444) or ordered (1234, 4321, 2468) sequences.</li>\n</ul>\n\n<p><b>Medium</b></p>\n<ul type=\"disc\">\n <li>PIN with no repeating (4444) or ordered (1234, 4321, 2468) sequences with a minimum length of at least 4 characters</li>\n <li>Alphabetic passwords with a minimum length of at least 4 characters</li>\n <li>Alphanumeric passwords with a minimum length of at least 4 characters</li>\n</ul>\n\n<p><b>High</b></p>\n<ul type=\"disc\">\n <li>PIN with no repeating (4444) or ordered (1234, 4321, 2468) sequences with a minimum length of at least 8 characters</li>\n <li>Alphabetic passwords with a minimum length of at least 6 characters</li>\n <li>Alphanumeric passwords with a minimum length of at least 6 characters</li>\n</ul>\n<p></p>",
|
||||
"deviceLockedOpenFilesOptionsText": "When device is locked and there are open files",
|
||||
"deviceLockedOptionText": "When device is locked",
|
||||
"deviceManufacturer": "Device manufacturer",
|
||||
@@ -9979,6 +10015,8 @@
|
||||
"licenseTypeLabel": "License type",
|
||||
"modeTableHeader": "Group mode",
|
||||
"policySet": "Policy Set",
|
||||
"preventAutoAppUpdate": "Prevent automatic app updates",
|
||||
"preventManagedAppBackup": "Prevent iCloud app backup",
|
||||
"restartGracePeriodHeader": "Restart grace period",
|
||||
"startTimeColumnLabel": "Availability",
|
||||
"tracks": "Tracks",
|
||||
@@ -10319,7 +10357,7 @@
|
||||
"webAppUrlHint": "Enter a valid url beginning with http:// or https://",
|
||||
"webAppUrlLabel": "App URL",
|
||||
"webAppUrlSizeHint": "The maximum length of the app url is 1024 characters",
|
||||
"windowsUrlValidation": "Enter a valid URL similar to https://www.microsoft.com/en-us/store/p/lync/9wzdncrfhvhm",
|
||||
"windowsUrlValidation": "Enter a valid URL similar to https://www.microsoft.com/store/p/lync/9wzdncrfhvhm",
|
||||
"xMLDataEntered": "XML Data Entered",
|
||||
"xmlFormatInvalid": "XML policy format is invalid.",
|
||||
"xmlTooLarge": "Input size must be less than 1 MB."
|
||||
@@ -10930,6 +10968,9 @@
|
||||
"allAppTypes": "Target to all app types",
|
||||
"androidPlatformLabel": "Android",
|
||||
"appsInAndroidWorkProfile": "Apps in Android Work Profile",
|
||||
"appsOnAndroidEnterpriseDedicatedDevicesWithAzureAdSharedMode": "Apps On Android Enterprise Dedicated Devices With Azure Ad Shared Mode",
|
||||
"appsOnAndroidOpenSourceProjectUserAssociated": "Apps On Android Open Source Project User Associated",
|
||||
"appsOnAndroidOpenSourceProjectUserless": "Apps On Android Open Source Project Userless",
|
||||
"appsOnIntuneManagedDevices": "Apps on Intune managed devices",
|
||||
"appsOnUnmanagedDevices": "Apps on unmanaged devices",
|
||||
"iOSPlatformLabel": "iOS/iPadOS",
|
||||
@@ -11138,7 +11179,7 @@
|
||||
"infoBalloon": "The version of iOS/iPadOS to install on devices at time of update.",
|
||||
"label": "Select version to install"
|
||||
},
|
||||
"header": "Create a profile to force assigned devices to automatically install the latest iOS/iPadOS updates. These settings determine how and when software updates deploy. This profile doesn't prevent users from updating the OS manually, which can be prevented for up to 90 days with a device configuration restriction policy. Updates will only apply to devices enrolled through Apple's Automated Device Enrollment (with ABM or ASM).",
|
||||
"header": "Create a profile to force assigned devices to automatically install the latest iOS/iPadOS updates. These settings determine how and when software updates deploy. This profile doesn't prevent users from updating the OS manually, which can be prevented for up to 90 days with a device configuration restriction policy. Updates will only apply to supervised devices.",
|
||||
"notAvailable": "N/A"
|
||||
}
|
||||
},
|
||||
@@ -11568,10 +11609,11 @@
|
||||
"appBundles": "App Bundles",
|
||||
"appCategories": "App categories",
|
||||
"appConfigPolicies": "App configuration policies",
|
||||
"appConfigurationStatus": "App Configuration Status",
|
||||
"appInstallStatus": "App install status",
|
||||
"appLicences": "App licenses",
|
||||
"appProtectionPolicies": "App protection policies",
|
||||
"appProtectionStatus": "App protection status",
|
||||
"appProtectionStatus": "App Protection status",
|
||||
"appSelectiveWipe": "App selective wipe",
|
||||
"appleVppTokens": "Apple VPP Tokens",
|
||||
"apps": "Apps",
|
||||
@@ -11592,6 +11634,7 @@
|
||||
"conditions": "Locations",
|
||||
"configMgr": "Microsoft Endpoint Configuration Manager",
|
||||
"configurationProfiles": "Configuration profiles",
|
||||
"configurationScripts": "Configuration Scripts",
|
||||
"connectorsAndTokens": "Connectors and tokens",
|
||||
"corporateDeviceIdentifiers": "Corporate device identifiers",
|
||||
"customAttributes": "Custom attributes",
|
||||
@@ -11614,8 +11657,9 @@
|
||||
"enrollmentRestrictions": "Enrollment restrictions",
|
||||
"exchangeActiveSync": "Exchange ActiveSync",
|
||||
"exchangeServiceConnectors": "Exchange service connectors",
|
||||
"failuresForFeatureUpdates": "Feature update failures (preview)",
|
||||
"failuresForQualityUpdates": "Windows Expedited update failures (preview)",
|
||||
"failuresForDriverUpdates": "Windows Driver update failures (preview)",
|
||||
"failuresForFeatureUpdates": "Feature update failures",
|
||||
"failuresForQualityUpdates": "Windows Expedited update failures",
|
||||
"featureFlighting": "Feature flighting",
|
||||
"featureUpdateDeployments": "Feature updates for Windows 10 and later",
|
||||
"flighting": "Flighting",
|
||||
@@ -11628,8 +11672,8 @@
|
||||
"incompleteUserEnrollments": "Incomplete user enrollments",
|
||||
"iosUpdates": "Update policies for iOS/iPadOS",
|
||||
"legacyPcManagement": "Legacy PC management",
|
||||
"macOSSoftwareUpdate": "Update policies for macOS (preview)",
|
||||
"macOSSoftwareUpdateAccountSummaries": "Installation status for macOS devices (preview)",
|
||||
"macOSSoftwareUpdate": "Update policies for macOS",
|
||||
"macOSSoftwareUpdateAccountSummaries": "Installation status for macOS devices",
|
||||
"macOSSoftwareUpdateCategorySummaries": "Software updates summary",
|
||||
"macOSSoftwareUpdateStateSummaries": "updates",
|
||||
"managedGooglePlay": "Managed Google Play",
|
||||
@@ -11672,7 +11716,6 @@
|
||||
"troubleshootSupport": "Troubleshooting + support",
|
||||
"user": "User",
|
||||
"userExecutionStatus": "User status",
|
||||
"warranty": "Warranty vendors",
|
||||
"wdacSupplementalPolicies": "S mode supplemental policies",
|
||||
"windows10DriverUpdate": "Driver updates for Windows 10 and later (preview)",
|
||||
"windows10QualityUpdate": "Quality updates for Windows 10 and later",
|
||||
@@ -11866,7 +11909,7 @@
|
||||
"countryNameBN": "Brunei",
|
||||
"countryNameBD": "Bangladesh",
|
||||
"countryNameMW": "Malawi",
|
||||
"countryNameGM": "Gambia, The",
|
||||
"countryNameGM": "Gambia",
|
||||
"countryNameGA": "Gabon",
|
||||
"countryNameCA": "Canada",
|
||||
"countryNameSH": "Saint Helena",
|
||||
@@ -11986,7 +12029,7 @@
|
||||
"countryNameSG": "Singapore",
|
||||
"countryNameAL": "Albania",
|
||||
"countryNameSN": "Senegal",
|
||||
"countryNameSZ": "Swaziland",
|
||||
"countryNameSZ": "Eswatini",
|
||||
"countryNameBZ": "Belize",
|
||||
"countryNameCI": "Côte d’Ivoire",
|
||||
"countryNameTW": "Taiwan",
|
||||
|
||||
Reference in New Issue
Block a user