Skip to content

Latest commit

 

History

History
361 lines (233 loc) · 22.9 KB

File metadata and controls

361 lines (233 loc) · 22.9 KB
title In development - Microsoft Intune
description This article describes Microsoft Intune features that are in development.
ms.date 04/08/2026
ms.topic whats-new
ms.reviewer intuner
ms.collection
M365-identity-device-management

In development for Microsoft Intune

To help in your readiness and planning, this article lists Intune UI updates and features that are in development but not yet released. Also:

  • If we anticipate that you need to take action before a change, we'll publish a complementary post in the Office message center.
  • When a feature enters production, whether it's in preview or generally available, the feature description moves from this article to What's new.
  • Refer to the Microsoft 365 roadmap for strategic deliverables and timelines.

This article and the What's new article are updated periodically. Check back for more updates.

Note

This article reflects our current expectations about Intune capabilities in an upcoming release. Dates and individual features might change. This article doesn't describe all features in development. It was last updated on the date shown under the title.

You can use RSS to be notified when this article is updated. For more information, see How to use the docs.

Microsoft Intune Suite

Scope tags support for Endpoint Privilege Management reports

We're fixing how scope tags work with Endpoint Privilege Management (EPM) reports. With this change, EPM reports will respect the report viewers assigned scope and display the details for only the users and devices that the report user is scoped to view.

Expanded support for Endpoint Privilege Management support approved elevation requests

Soon Endpoint Privilege Management (EPM) will support the use of support approved elevation requests by all users of a device. Today, requesting elevation that requires support approval is limited to the device's primary user or the user who enrolled the device. This update expands the utility of support approved elevations and helps to improve scenarios that involve shared devices.

App management

Direct Android line-of-business app management

You'll be able to manage Android line-of-business (LOB) apps in Microsoft Intune without using Managed Google Play for Android Enterprise fully managed (COBO) and dedicated (COSU) devices. You can upload APK files directly to Intune and deploy required apps to corporate-owned fully managed and dedicated devices.

Direct LOB app management enables you to:

  • Deploy in-house LOB APKs directly to Android Enterprise fully managed and dedicated devices
  • Manage app updates without a Managed Google Play account
  • Simplify deployment for organizations that don't use Managed Google Play
  • Create app configuration policies for directly deployed LOB apps, giving you the same configuration flexibility you have for Managed Google Play apps

[!div class="checklist"] Applies to:

  • Android Enterprise

Multiple managed accounts for app protection policies

The Multiple Managed Accounts (MMA) feature for Intune mobile application management (MAM) will enable users to add and manage more than one managed account within a single app. With MMA, app protection policies will be enforced independently for each account, as defined by the admin. This capability will be especially useful for scenarios such as consultants working across organizations, company acquisitions, or users managing multiple mailboxes within the same tenant.

[!div class="checklist"] Applies to:

  • iOS/iPadOS
  • Android

Device configuration

Configure credential manager permissions for Android Enterprise devices

Android's Credential Provider capability will allow you to control which applications can act as system-level credential providers, responsible for password autofill and passkey storage on corporate-owned work profile, fully managed, dedicated, or personally owned work profile Android devices.

To configure credential manager permissions, you'll go to Apps > Android > Configuration > Managed Devices. Choose Android Enterprise as the platform type.

By default, Android blocks third-party credential providers on managed devices. This new configuration setting will let you:

  • Allow specific apps (such as Microsoft Authenticator or a third-party password manager) to act as credential providers
  • Enable passkey-based sign-in across managed Android Enterprise devices
  • Maintain control over which credential sources are trusted on corporate devices

A known limitation from the Intune side is that Google Password Manager will not be allowed to act as Credential Provider on corporate owned work profile devices or personally owned work profile devices. It will be blocked on the end user's device. Use a different credential app as a workaround.

[!div class="checklist"] Applies to:

  • Android fully managed devices (COBO)
  • Android dedicated devices (COSU)
  • Android corporate-owned devices with a work profile (COPE)
  • Android personally owned devices with a work profile (BYOD) using Android Management API (AM API)

Block location setting for Android Enterprise can keep Location services enabled

On Android Enterprise devices, you can use the General > Block location in the settings catalog to disable the location services on the device and prevent users from turning it on.

This setting is changing. It will be called Location and will have three options you can configure:

  • Device default - Intune doesn't change or update this setting. By default, the OS allows end users to turn location services on or off.
  • Location enabled - Requires location services to be on and prevents end users from turning them off.
  • Location disabled - Requires location services to be off and prevents end users from turning them on.

[!div class="checklist"] Applies to:

  • Android Enterprise corporate-owned devices with a work profile (COPE) running Android 10 and earlier
  • Android Enterprise corporate owned fully managed (COBO)
  • Android Enterprise corporate owned dedicated devices (COSU)

Device enrollment

Access management for Apple services

You will be able to use Apple access management settings in Apple Business Manager and Apple School Manager to configure service access for Apple accounts on organization-owned devices. These controls will let you choose what devices users can sign in to and which apps and services are available to them. For more information about how Apple defines service access and Apple account permissions, see the Apple Business Manager User Guide(opens Apple support site).

[!div class="checklist"] Applies to:

  • iOS/iPadOS
  • macOS

Complete Platform SSO registration during macOS Automated Device Enrollment

On macOS devices enrolled with Automated Device Enrollment (ADE), you can enable and complete Platform SSO device registration:

  • In a settings catalog policy, add and configure the EnableRegistrationDuringSetup setting, and save your policy.

  • In Setup Assistant > Await final configuration, add the settings catalog policy.

  • During enrollment, users sign in twice:

    • The first sign-in starts the regular enrollment process.
    • The second sign-in authenticates the user identity in Company Portal and gets the SSO extension.

    In a future update (no ETA), there will be updates that reduce number of sign-ins for PSSO during the Setup Assistant flow.

When this feature is enabled, users have access to resources immediately when they arrive at desktop.

Prerequisites:

  • Devices must be enrolled through Apple Business Manager or Apple School Manager using ADE.
  • The ADE enrollment profile must be configured to use Setup Assistant with modern authentication.
  • Before you enroll, create a settings catalog policy, and configure the EnableRegistrationDuringSetup setting. In the Await final configuration in Setup Assistant, add the settings catalog policy.
  • Before you enroll, deploy the Company Portal (5.2604.0 and newer is required) as a line-of-business app.

[!div class="checklist"] Applies to:

  • macOS Automated Device Enrollment (ADE)

Microsoft Intune will support userless ADE for visionOS and tvOS devices

Microsoft Intune will be adding support for userless automated device enrollment (ADE) for visionOS and tvOS devices, enabling you to enroll and manage Apple Vision Pro and Apple TV through Apple Business Manager or Apple School Manager. This capability will support ADE without user affinity and includes custom configuration uploads for settings, default enrollment restrictions, and remote device actions. The feature will be available with Microsoft Intune Plan 2 as part of the Microsoft 365 Suite. Enrolled visionOS and tvOS devices will appear alongside iOS and iPadOS devices in the Intune admin center within Apple mobile and can be filtered. Support will require tvOS 26 and later or visionOS 26 and later. We recommend that you keep these devices up to date to receive the latest security fixes.

Device management

Agentic identity for the Policy Configuration Agent (public preview)

The Intune Policy Configuration Agent will update to use a Microsoft Entra agentic identity instead of a human user identity. This enables the agent to run policy configuration actions securely and independently.

For existing agents, admins will be able to transition to an agentic identity from the agent's Settings tab by selecting Create new identity. After the identity is provisioned, the agent will now run on behalf of the logged in user and the information will be scoped by the permissions of that account. For new agents, an agentic identity will be auto provisioned at setup.

Updated minimum version for Intune Management Extension on Windows

Windows devices managed by Intune will need to run Intune Management Extension version 1.58.103.0 or later. Devices on earlier versions will no longer receive configurations or updates that depend on the Intune Management Extension, including Win32 app deployments, PowerShell scripts, remediations, and platform scripts.

The Intune Management Extension updates automatically, so most managed devices should already have a compatible version. Verify that your devices can sync with Intune to receive updates.

[!div class="checklist"] Applies to:

  • Windows 10/11

Silence apps on Managed Home Screen to prevent session PIN bypass

For devices using Managed Home Screen (MHS), you'll be able to silence apps whenever MHS is prompting the user for authentication, such as during sign-in or at the session PIN screen. When silenced, apps won't be able to start activities, display notifications, appear in recent apps, or trigger toasts, dialogs, or device ringing. You'll be able to configure an allowlist of apps that remain unsilenced during the locked state, ensuring that critical communications like calls aren't interrupted. This feature will be opt-in and configurable, allowing your organization to tailor the experience to its operational needs. Once the device is unlocked, all apps will automatically return to their normal state.

[!div class="checklist"] Applies to:

  • Android Enterprise

Android Enterprise personally owned devices with a work profile will use Android Management API (AMAPI)

When users enroll their personally owned Android devices in Intune, a work profile is created with a separate partition on the device for the user's work account. These devices are referred to as personally owned devices with a work profile.

As part of the Intune move to the Android Management API (opens Android's web site), there will be some updates for personally owned devices that enroll in Intune:

  • Web based enrollment for an improved enrollment flow and experience - Users won't have to install an app to enroll in Intune. Web enrollment will be tenant wide.
  • New implementation for how Intune delivers policies - Modern update on how Intune delivers and monitors policies on Android personally owned devices with a work profile. This change also aligns with how Intune manages policies on corporate owned devices with a work profile, fully managed, and dedicated devices. You can scale your migration to targeted groups.

To use these features, you will need to opt-in:

  • Web based enrollment: Devices > Device Onboarding > Enrollment > Android > Personally owned devices with a work profile > Use web enrollment for all users enrolling into Android personally-owned work profile management
  • Policy: Devices > Manage devices > Configuration > Create > New policy > Android Enterprise > Move to Android Management API

To learn more, see:

[!div class="checklist"] Applies to:

  • Android Enterprise personally owned devices with a work profile

Device page in the Intune admin center is updated (public preview)

In the Intune admin center, when you go to Devices > All Devices and select a device, you'll notice a new full-page layout that gives you a single view of the device. Use this view to:

  • Track device activity
  • Access tools and reports
  • Manage device information

The single device page has the following tabs:

  • Device action status: Shows requested, in‑progress, and recently completed device actions. You can search, sort, and filter this list. You'll be able to quickly understand what actions are running or have completed without leaving the device view.
  • Tools + reports: This tab was previously called Overview. It shows monitoring reports, lists, and tools, like remediations, that were previously accessed in another part of the admin center.
  • Properties: Contains admin‑modifiable device properties with visible scope tags and a dedicated editing view.
  • Device details: This was previously called Hardware. It provides physical device information and key Intune and Microsoft Entra management details.

Other features:

  • Device actions are grouped, ordered, and labeled consistently across platforms and device types, with improved logic to show only relevant and permitted actions. Destructive actions are clearly separated and require confirmation, reducing unintentional actions.

  • The updated layout uses a standard structure across device types and platforms, while adapting to platform‑specific capabilities.

  • Improved labeling, hierarchy, and formatting make device information easier to scan and understand. Essentials elevates important device information and is accessible from any tab.

All existing device management capabilities remain available. This update focuses on making them easier to find and use.

New remote actions to suspend and restore Managed Home Screen on Android devices

Intune will soon include two new remote actions that let admins temporarily suspend and later restore managed home screen (MHS) on Android devices. These actions allow users to exit MHS and access the device's default launcher for a specified duration, without removing policies or requiring a PIN.

After the defined time elapses, or when the restore managed home screen action is triggered, MHS is automatically restored, helping maintain device security while minimizing disruption.

[!div class="checklist"] Applies to:

  • Android Enterprise corporate-owned Fully Managed (COBO)
  • Android Enterprise corporate-owned Dedicated (COSU)

Device security

Security Baseline for audits of Security Technical Implementation Guides

We're adding a new security baseline that audits devices against the recommended configuration of Security Technical Implementation Guides (STIGs).

The new baseline will be available for US Government Community Cloud High (GCC High) tenants, and focused on audits and not on configuration. Applicable to Windows devices, the baseline generates detailed reports on which devices meet the recommended settings for compliance with STIGs.

[!div class="checklist"] Applies to:

  • Windows

For information about the currently available Intune security baselines, see Security baselines overview.

Support for Intune Device control policy for devices managed by Microsoft Defender for Endpoint

You'll be able to use the endpoint security policy for Device control (Attack surface reduction policy) from the Microsoft Intune with the devices you manage through the Microsoft Defender for Endpoint security settings management capability.

[!div class="checklist"] Applies to the following when you use the Windows platform:

  • Windows 10
  • Windows 11

When this change takes effect, devices that are assigned this policy while managed by Defender for Endpoint but not enrolled with Intune, will now apply the settings from the policy. Check your policy to make sure only the devices you intend to receive this policy will get it.

Monitor and troubleshoot

Enhanced app inventory with faster data updates

Intune enhanced app inventory will bring faster, more detailed visibility into the apps in your environment to support identification of outdated or risky software. Improved data freshness and richer app metadata will provide clearer insight into installed applications, while new controls will let you specify which devices are included in inventory collection.

This feature will be initially available for Windows, with additional platforms to follow.

[!div class="checklist"] Applies to:

  • Windows 10/11

Intune Data Warehouse (beta) connector deprecation in Power BI

The Intune Data Warehouse (beta) connector in Power BI will be retired. If you use Power BI reports that rely on this connector, you'll need to transition to Intune connector v2 or the OData Feed connector before the retirement completes.

Power BI reports created after November 2025 already use connector v2. Reports created before November 2025 may still use the beta connector and will need to be updated.

The transition will begin in late April 2026 and occur gradually over two weeks. After the transition completes, data access through the beta connector will no longer be available.

[!div class="checklist"] Applies to:

  • Windows
  • iOS/iPadOS
  • macOS
  • Android

Reporting considerations for compliance policies

Intune will add new guidance to the compliance policy reporting documentation to help clarify expected reporting behaviors. This documentation update will address common questions about how compliance policy reports reflect device state, including:

  • Check-in dependency: Compliance policy reports are updated when a device checks in with the Intune service. Reporting data refreshes during device check-in and policy refresh cycles and might not immediately reflect recent assignment or targeting changes.
  • Multi-user devices: Compliance reports display the compliance state for the last user who checked in on the device. If multiple users sign in to a shared device, the report can reflect the last known compliance state for a previous user.
  • Pending status: A device might appear in a Pending state if it has not yet checked in to receive or report compliance policy status. This status can persist in reports until the next reporting cycle completes.
  • Multiple records: Policy reports can show multiple records for a single device, such as separate entries associated with user and system contexts. This behavior can occur when different users sign in to the same device or when automatic device check-ins occur.
  • Summary vs. detail differences: Summary report views and detailed device lists can update on different cadences. As a result, aggregated summary values might temporarily differ from detailed report entries.

Tenant administration

Change Review Agent suggestions available inline in Multi Admin Approval (public preview)

We're updating the Multi Admin Approval page in the Intune admin center to include a new Agent Response column for Windows PowerShell scripts. Approvers will be able to view the Change Review Agent risk-based recommendations inline, without navigating to the agent's own experience. Change Review Agent suggestions will continue to be available in the agent's primary experience as well.

Notices

[!INCLUDE Intune notices]

See also

For details about recent developments, see What's new in Microsoft Intune.