You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: memdocs/intune/fundamentals/in-development.md
+149Lines changed: 149 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -82,6 +82,9 @@ These new app types work in a similar way to the existing **web link** applicati
82
82
83
83
## Device management
84
84
85
+
### View contents of macOS shell scripts and custom attributes<!-- 14757037 -->
86
+
You'll be able to view the contents of macOS shell scripts and custom attributes after you upload these to Intune. When this capability is available, you'll be able to view Shell scripts and custom attributes in [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) by selecting **Devices** > **macOS**. For related information, see [Use shell scripts on macOS devices in Intune](../apps/macos-shell-scripts.md).
87
+
85
88
### Intune moving to support iOS/iPadOS 16 and higher later this year<!-- 14778947 -->
86
89
Later this year, Apple is expected to release iOS/iPadOS 16. Due to this expected release, Microsoft Intune and the Intune Company Portal will require iOS/iPadOS 14 and higher shortly after the release of iOS/iPad 16. For related information, see [Supported operating systems and browsers in Intune](../fundamentals/supported-devices-browsers.md).
87
90
@@ -92,6 +95,137 @@ With Apple's expected release of macOS 13 Ventura later this year, Microsoft Int
92
95
93
96
## Device configuration
94
97
98
+
### iOS/iPadOS settings catalog will support declarative device management<!-- 15016105 -->
99
+
On iOS/iPadOS 15+ devices enrolled using [User Enrollment](../enrollment/ios-user-enrollment.md), the settings catalog will be able use Apple’s declarative device management (DDM) when configuring settings.
100
+
101
+
- No action is required to use DDM. The feature will be built into the settings catalog.
102
+
- There is no impact to existing policies in the settings catalog.
103
+
- iOS/iPadOS devices that aren't enabled for DDM will continue to use Apple’s standard MDM protocol.
104
+
105
+
For more information, go to:
106
+
-[Meet declarative device management](https://aka.ms/DDM2021) (opens Apple's web site)
107
+
-[Microsoft simplifies Endpoint Manager enrollment for Apple updates](https://techcommunity.microsoft.com/t5/microsoft-endpoint-manager-blog/microsoft-simplifies-endpoint-manager-enrollment-for-apple/ba-p/3570319)
108
+
-[Use the settings catalog to configure settings on Windows, iOS/iPadOS and macOS devices](../configuration/settings-catalog.md)
109
+
110
+
Applies to:
111
+
- iOS/iPadOS 15 or later devices enrolled using Apple User Enrollment
112
+
113
+
### New macOS settings available in the Settings Catalog <!-- 15020250 -->
114
+
The [Settings Catalog](../configuration/settings-catalog.md) lists all the settings you can configure in a device policy, and all in one place. There are new settings are available in the Settings Catalog (**Devices** > **Configuration profiles** > **Create profile** > **macOS** for platform > **Settings catalog** for profile type).
115
+
116
+
New settings include:
117
+
118
+
**Microsoft Auto Update**:
119
+
120
+
- Current Channel
121
+
- Number of minutes for the final countdown timer
122
+
123
+
**Restrictions**:
124
+
125
+
- Allow Universal Control
126
+
127
+
The following settings are also in Settings Catalog. Previously, they were only available in Templates:
128
+
129
+
**Authentication > Extensible Single Sign On**:
130
+
131
+
- Extension Data
132
+
- Extension Identifier
133
+
- Hosts
134
+
- Realm
135
+
- Screen Locked Behavior
136
+
- Team Identifier
137
+
- Type
138
+
- URLs
139
+
140
+
**Authentication > Extensible Single Sign On > Extensible Single Sign On Kerberos**:
141
+
142
+
- Extension Data
143
+
- Allow Automatic Login
144
+
- Allow Password Change
145
+
- Credential Bundle ID ACL
146
+
- Credential Use Mode
147
+
- Custom Username Label
148
+
- Delay User Setup
149
+
- Domain Realm Mapping
150
+
- Help Text
151
+
- Include Kerberos Apps In Bundle ID ACL
152
+
- Include Managed Apps In Bundle ID ACL
153
+
- Is Default Realm
154
+
- Monitor Credentials Cache
155
+
- Perform Kerberos Only
156
+
- Preferred KDCs
157
+
- Principal Name
158
+
- Password Change URL
159
+
- Password Notification Days
160
+
- Password Req Complexity
161
+
- Password Req History
162
+
- Password Req Length
163
+
- Password Req Min Age
164
+
- Password Req Text
165
+
- Require TLS For LDAP
166
+
- Require User Presence
167
+
- Site Code
168
+
- Sync Local Password
169
+
- Use Site Auto Discovery
170
+
- Extension Identifier
171
+
- Hosts
172
+
- Realm
173
+
- Team Identifier
174
+
- Type
175
+
176
+
For more information about configuring Settings catalog profiles in Intune, see [Create a policy using settings catalog](../configuration/settings-catalog.md).
177
+
178
+
Applies to:
179
+
- macOS
180
+
181
+
### New iOS/iPadOS settings in the Settings Catalog<!-- 15020319 -->
182
+
The [Settings Catalog](../configuration/settings-catalog.md) lists all the settings you can configure in a device policy, and all in one place. There are new iOS/iPadOS settings available in the Settings Catalog (**Devices** > **Configuration profiles** > **Create profile** > **iOS/iPadOS** for platform > **Settings catalog** for profile type). Previously, these settings were only available in Templates:
183
+
184
+
**Authentication > Extensible Single Sign On**:
185
+
186
+
- Extension Data
187
+
- Extension Identifier
188
+
- Hosts
189
+
- Realm
190
+
- Screen Locked Behavior
191
+
- Team Identifier
192
+
- Type
193
+
- URLs
194
+
195
+
**Authentication > Extensible Single Sign On > Extensible Single Sign On Kerberos**:
196
+
197
+
- Extension Data
198
+
- Allow Automatic Login
199
+
- Credential Bundle ID ACL
200
+
- Domain Realm Mapping
201
+
- Help Text
202
+
- Include Managed Apps In Bundle ID ACL
203
+
- Is Default Realm
204
+
- Preferred KDCs
205
+
- Principal Name
206
+
- Require User Presence
207
+
- Site Code
208
+
- Use Site Auto Discovery
209
+
- Extension Identifier
210
+
- Hosts
211
+
- Realm
212
+
- Team Identifier
213
+
- Type
214
+
215
+
**System Configuration > Lock Screen Message**:
216
+
- Asset Tag Information
217
+
- Lock Screen Footnote
218
+
219
+
For more information about configuring Settings catalog profiles in Intune, see [Create a policy using settings catalog](../configuration/settings-catalog.md).
220
+
221
+
Applies to:
222
+
- iOS/iPadOS
223
+
224
+
### SCEP certificate profile support for Android (ASOP) devices<!-- 8506336 -->
225
+
To expand our support for the Android Open Source Project (AOSP) platform, you’ll soon be able to deploy Simple Certificate Enrollment Protocol (SCEP) certificate profiles to corporate-owned and userless devices. In Intune, you can find this functionality in **Devices** > **Configuration profiles** > **Create profile** > **Android (AOSP)**.
226
+
227
+
This expands on the [certificate profile support](../fundamentals/whats-new.md#certificate-profiles-support-for-android-asop-devices) that was added in June of 2022.
228
+
95
229
### Filter on the user scope or device scope in the Settings Catalog for Windows devices<!-- 13949975 -->
96
230
When you create a Settings Catalog policy, you can use **Add settings** > **Add filter** to filter settings based on the Windows OS edition (**Devices** > **Configuration profiles** > **Create profile** > **Windows 10 and later** for platform > **Settings Catalog (preview)** for profile type).
97
231
@@ -138,6 +272,21 @@ Features of the reusable settings groups will include:
138
272
139
273
Reusable groups will be configured on a new Tab for *Reusable settings* that will be available when you view endpoint security Firewall policy. In the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) > **Endpoint security** > **Firewall**.
### Configure zero-touch enrollment in the admin center<-- 1872357 -->
280
+
Configure zero-touch enrollment seamlessly from the admin center. This feature will let you link your zero-touch account to Intune, add support information, configure zero-touch enabled devices with Android Device Policy, and customize provisioning extras.
### Open Help and Support without losing your context in the Microsoft Endpoint Manager admin center<!-- 12469338 -->
287
+
You’ll soon be able to use the **?** icon in the Microsoft Endpoint Manager admin center to open a help and support session without losing your current node of focus in the admin center. The **?** icon is always available in the upper right of the admin center title bar. This change will add an additional method for accessing *Help and support*.
288
+
289
+
When you select **?**, the admin center will open a new and separate side-by-side pane you use to navigate the support experience. By opening this separate pane, you’ll be free to navigate the support experience without affecting your original location and focus on the admin center. You will however be free to navigate through the admin center in that original pane if you choose.
0 commit comments