Skip to content

Commit 06a484e

Browse files
committed
erikre-removeid-15111546
1 parent 6e304ca commit 06a484e

1 file changed

Lines changed: 1 addition & 167 deletions

File tree

memdocs/intune/fundamentals/in-development.md

Lines changed: 1 addition & 167 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ keywords:
88
author: dougeby
99
ms.author: dougeby
1010
manager: dougeby
11-
ms.date: 07/28/2022
11+
ms.date: 08/19/2022
1212
ms.topic: conceptual
1313
ms.service: microsoft-intune
1414
ms.subservice: fundamentals
@@ -65,9 +65,6 @@ You can use RSS to be notified when this article is updated. For more informatio
6565

6666
## App management
6767

68-
### Noncompliance details available for Android (AOSP) in Microsoft Intune app<!-- 12645770 -->
69-
Android (AOSP) users will be able to view the reasons why devices are marked as noncompliant in the Microsoft Intune app. This information will be available in the Intune app for devices enrolled as user-associated Android (AOSP) devices.
70-
7168
### New app types for Microsoft Endpoint Manager<!-- 7210233 -->
7269
As an admin, you will be able to create and assign two new types of Intune apps:
7370
- **iOS/iPadOS web clip**
@@ -79,20 +76,6 @@ These new app types work in a similar way to the existing **web link** applicati
7976

8077
## Device management
8178

82-
### Reset passcode remote action available for Android (AOSP) Corporate devices<!-- 10247332 -->
83-
You will be able to leverage Reset passcode remote action from the Microsoft Endpoint Manager admin center for Android Open Source Project (AOSP) Corporate devices.
84-
85-
For information on remote actions, see:
86-
- [Reset or remove a device passcode in Intune](../remote-actions/device-passcode-reset.md)
87-
- [Remotely restart devices with Intune](../remote-actions/device-restart.md)
88-
- [Remotely lock devices with Intune](../remote-actions/device-remote-lock.md)
89-
90-
Applies to:
91-
- Android Open Source Project (AOSP)
92-
93-
### View contents of macOS shell scripts and custom attributes<!-- 14757037 -->
94-
You'll be able to view the contents of macOS shell scripts and custom attributes after you upload these to Intune. When this capability is available, you'll be able to view Shell scripts and custom attributes in [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) by selecting **Devices** > **macOS**. For related information, see [Use shell scripts on macOS devices in Intune](../apps/macos-shell-scripts.md).
95-
9679
### Intune moving to support iOS/iPadOS 14 and higher later this year<!-- 14778947 -->
9780
Later this year, Apple is expected to release iOS/iPadOS 16. Due to this expected release, Microsoft Intune and the Intune Company Portal will require iOS/iPadOS 14 and higher shortly after the release of iOS/iPad 16. For related information, see [Supported operating systems and browsers in Intune](../fundamentals/supported-devices-browsers.md).
9881

@@ -103,137 +86,6 @@ With Apple's expected release of macOS 13 Ventura later this year, Microsoft Int
10386

10487
## Device configuration
10588

106-
### iOS/iPadOS settings catalog will support declarative device management<!-- 15016105 -->
107-
On iOS/iPadOS 15+ devices enrolled using [User Enrollment](../enrollment/ios-user-enrollment.md), the settings catalog will be able use Apple’s declarative device management (DDM) when configuring settings.
108-
109-
- No action is required to use DDM. The feature will be built into the settings catalog.
110-
- There is no impact to existing policies in the settings catalog.
111-
- iOS/iPadOS devices that aren't enabled for DDM will continue to use Apple’s standard MDM protocol.
112-
113-
For more information, go to:
114-
- [Meet declarative device management](https://aka.ms/DDM2021) (opens Apple's web site)
115-
- [Microsoft simplifies Endpoint Manager enrollment for Apple updates](https://techcommunity.microsoft.com/t5/microsoft-endpoint-manager-blog/microsoft-simplifies-endpoint-manager-enrollment-for-apple/ba-p/3570319)
116-
- [Use the settings catalog to configure settings on Windows, iOS/iPadOS and macOS devices](../configuration/settings-catalog.md)
117-
118-
Applies to:
119-
- iOS/iPadOS 15 or later devices enrolled using Apple User Enrollment
120-
121-
### New macOS settings available in the Settings Catalog <!-- 15020250 -->
122-
The [Settings Catalog](../configuration/settings-catalog.md) lists all the settings you can configure in a device policy, and all in one place. There are new settings are available in the Settings Catalog (**Devices** > **Configuration profiles** > **Create profile** > **macOS** for platform > **Settings catalog** for profile type).
123-
124-
New settings include:
125-
126-
**Microsoft Auto Update**:
127-
128-
- Current Channel
129-
- Number of minutes for the final countdown timer
130-
131-
**Restrictions**:
132-
133-
- Allow Universal Control
134-
135-
The following settings are also in Settings Catalog. Previously, they were only available in Templates:
136-
137-
**Authentication > Extensible Single Sign On**:
138-
139-
- Extension Data
140-
- Extension Identifier
141-
- Hosts
142-
- Realm
143-
- Screen Locked Behavior
144-
- Team Identifier
145-
- Type
146-
- URLs
147-
148-
**Authentication > Extensible Single Sign On > Extensible Single Sign On Kerberos**:
149-
150-
- Extension Data
151-
- Allow Automatic Login
152-
- Allow Password Change
153-
- Credential Bundle ID ACL
154-
- Credential Use Mode
155-
- Custom Username Label
156-
- Delay User Setup
157-
- Domain Realm Mapping
158-
- Help Text
159-
- Include Kerberos Apps In Bundle ID ACL
160-
- Include Managed Apps In Bundle ID ACL
161-
- Is Default Realm
162-
- Monitor Credentials Cache
163-
- Perform Kerberos Only
164-
- Preferred KDCs
165-
- Principal Name
166-
- Password Change URL
167-
- Password Notification Days
168-
- Password Req Complexity
169-
- Password Req History
170-
- Password Req Length
171-
- Password Req Min Age
172-
- Password Req Text
173-
- Require TLS For LDAP
174-
- Require User Presence
175-
- Site Code
176-
- Sync Local Password
177-
- Use Site Auto Discovery
178-
- Extension Identifier
179-
- Hosts
180-
- Realm
181-
- Team Identifier
182-
- Type
183-
184-
For more information about configuring Settings catalog profiles in Intune, see [Create a policy using settings catalog](../configuration/settings-catalog.md).
185-
186-
Applies to:
187-
- macOS
188-
189-
### New iOS/iPadOS settings in the Settings Catalog<!-- 15020319 -->
190-
The [Settings Catalog](../configuration/settings-catalog.md) lists all the settings you can configure in a device policy, and all in one place. There are new iOS/iPadOS settings available in the Settings Catalog (**Devices** > **Configuration profiles** > **Create profile** > **iOS/iPadOS** for platform > **Settings catalog** for profile type). Previously, these settings were only available in Templates:
191-
192-
**Authentication > Extensible Single Sign On**:
193-
194-
- Extension Data
195-
- Extension Identifier
196-
- Hosts
197-
- Realm
198-
- Screen Locked Behavior
199-
- Team Identifier
200-
- Type
201-
- URLs
202-
203-
**Authentication > Extensible Single Sign On > Extensible Single Sign On Kerberos**:
204-
205-
- Extension Data
206-
- Allow Automatic Login
207-
- Credential Bundle ID ACL
208-
- Domain Realm Mapping
209-
- Help Text
210-
- Include Managed Apps In Bundle ID ACL
211-
- Is Default Realm
212-
- Preferred KDCs
213-
- Principal Name
214-
- Require User Presence
215-
- Site Code
216-
- Use Site Auto Discovery
217-
- Extension Identifier
218-
- Hosts
219-
- Realm
220-
- Team Identifier
221-
- Type
222-
223-
**System Configuration > Lock Screen Message**:
224-
- Asset Tag Information
225-
- Lock Screen Footnote
226-
227-
For more information about configuring Settings catalog profiles in Intune, see [Create a policy using settings catalog](../configuration/settings-catalog.md).
228-
229-
Applies to:
230-
- iOS/iPadOS
231-
232-
### SCEP certificate profile support for Android (ASOP) devices<!-- 8506336 -->
233-
To expand our support for the Android Open Source Project (AOSP) platform, you’ll soon be able to deploy Simple Certificate Enrollment Protocol (SCEP) certificate profiles to corporate-owned and userless devices. In Intune, you can find this functionality in **Devices** > **Configuration profiles** > **Create profile** > **Android (AOSP)**.
234-
235-
This expands on the [certificate profile support](../fundamentals/whats-new.md#certificate-profiles-support-for-android-asop-devices) that was added in June of 2022.
236-
23789
### Filter on the user scope or device scope in the Settings Catalog for Windows devices<!-- 13949975 -->
23890
When you create a Settings Catalog policy, you can use **Add settings** > **Add filter** to filter settings based on the Windows OS edition (**Devices** > **Configuration profiles** > **Create profile** > **Windows 10 and later** for platform > **Settings Catalog (preview)** for profile type).
23991

@@ -245,17 +97,6 @@ Applies to:
24597
- Windows 10
24698
- Windows 11
24799

248-
### Import custom ADMX and ADML administrative templates to create a device configuration profile<!-- 4970862 -->
249-
You can create a device configuration policy that uses built-in ADMX templates (**Devices** > **Configuration profiles** > **Create profile** > **Windows 10 and later** for platform > **Templates** > **Administrative templates**).
250-
251-
You'll be able to import custom and 3rd party/partner ADMX and ADML templates into the Endpoint Manager admin center. Once imported, you can create a device configuration policy, assign the policy to your devices, and manage the settings in the policy.
252-
253-
For information on the built-in ADMX templates, see [Use Windows 10/11 templates to configure group policy settings in Microsoft Intune](../configuration/administrative-templates-windows.md).
254-
255-
Applies to:
256-
- Windows 11
257-
- Windows 10
258-
259100
<!-- ***********************************************-->
260101

261102
## Device security
@@ -277,13 +118,6 @@ Reusable groups will be configured on a new Tab for *Reusable settings* that wil
277118

278119
<!-- ***********************************************-->
279120

280-
## Device enrollment
281-
282-
### Configure zero-touch enrollment in the admin center<!-- 1872357 -->
283-
Configure zero-touch enrollment seamlessly from the admin center. This feature will let you link your zero-touch account to Intune, add support information, configure zero-touch enabled devices with Android Device Policy, and customize provisioning extras.
284-
285-
<!-- ***********************************************-->
286-
287121
## Monitor and troubleshoot
288122

289123
### Open Help and Support without losing your context in the Microsoft Endpoint Manager admin center<!-- 12469338 -->

0 commit comments

Comments
 (0)