You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: Device restriction settings for Android (AOSP) platform in Microsoft Intune
5
-
description: Use Android (AOSP) restriction settings to control a wide range of settings and features on AOSP devices.
4
+
title: Device restriction settings for Android (AOSP) in Microsoft Intune
5
+
description: On Android Open Source Project (AOSP) devices, restrict settings on the device. You can block the camera, block screenshots, disable bluetooth, block USB file transfer, and more in Microsoft Intune.
6
6
keywords:
7
7
author: MandiOhlinger
8
8
ms.author: mandia
9
9
manager: dougeby
10
-
ms.date: 10/19/2021
10
+
ms.date: 09/20/2022
11
11
ms.topic: conceptual
12
12
ms.service: microsoft-intune
13
13
ms.subservice: configuration
@@ -20,28 +20,26 @@ ms.technology:
20
20
21
21
params:
22
22
siblings_only: true
23
-
ms.reviewer: mikedano, chmaguir, chrisbal, priyar
23
+
ms.reviewer: priyar
24
24
ms.suite: ems
25
25
search.appverid: MET150
26
26
#ms.tgt_pltfrm:
27
-
ms.custom: intune-azure, seodec18
27
+
ms.custom: intune-azure
28
28
ms.collection: M365-identity-device-management
29
29
---
30
30
31
31
# Android (AOSP) device settings to allow or restrict features using Intune
32
32
33
-
*This feature is in public preview.*
33
+
This article describes the different settings you can control on Android (AOSP) devices. You can use these restrictions to configure password requirements and access to device features.
34
34
35
-
This article describes the different settings you can control on Android (AOSP) devices. You can use these restrictions to configure password requirements and access to device features.
35
+
This feature applies to:
36
36
37
-
This feature applies to the following Android (AOSP) device types:
To access these settings, create an [Android (AOSP) device restrictions profile](device-restrictions-configure.md). When prompted to select a **Platform**, choose **Android (AOSP)**.
42
+
Create an [AOSP device restrictions profile](device-restrictions-configure.md). For the platform, select **Android (AOSP)**.
45
43
46
44
## Device password
47
45
@@ -53,20 +51,20 @@ To access these settings, create an [Android (AOSP) device restrictions profile]
53
51
54
52
-**Minimum password length**: Enter the minimum number of digits the password must have, from 4 to 16.
55
53
56
-
-**Numeric complex**: Does not permit repeat or consecutive numbers, such as `1111` or `1234`. Also enter:
54
+
-**Numeric complex**: Doesn't permit repeat or consecutive numbers, such as `1111` or `1234`. Also enter:
57
55
58
56
-**Minimum password length**: Enter the minimum number of digits or characters a password must have, from 4 to 16.
59
57
60
58
-**Number of sign-in failures before wiping device**: Enter the number of sign-in attempts allowed, from 4 to 11, before the device is wiped. `0` (zero) might disable the device wipe functionality. When the value is blank, Intune doesn't change or update this setting.
61
59
62
60
-**Maximum minutes of inactivity until screen locks**: Enter the maximum length of time, from 1 minute to 1 hour, that devices can be idle before the screen is automatically locked. Users must enter their credentials to regain access. For example, enter `5` to lock the device after 5 minutes of inactivity. When the value is blank or set to **Not configured**, Intune doesn't change or update this setting.
63
61
64
-
> [!NOTE]
62
+
> [!NOTE]
63
+
>
65
64
>- RealWear devices currently only support device default, numeric, and numeric complex password types.
66
-
>- The password type **Password required, no restrictions** appears as an option but doesn't currently work on devices, which is a known issue.
67
-
65
+
>- The password type **Password required, no restrictions** appears as an option but doesn't currently work on devices, which is a known issue.
68
66
69
-
## General
67
+
## General
70
68
71
69
-**Block access to camera**: Prevents access to the camera on the device. When set to **Not configured** (default), Intune doesn't change or update this setting. By default, the OS might allow access to the camera.
72
70
@@ -82,16 +80,13 @@ To access these settings, create an [Android (AOSP) device restrictions profile]
82
80
83
81
-**Block Wi-Fi setting changes**: Prevents users from creating or changing any Wi-Fi configurations. When set to **Not configured** (default), Intune doesn't change or update this setting. By default, the OS might allow users to change the Wi-Fi settings on the device.
84
82
85
-
-**Disable Bluetooth**: Disables Bluetooth on the device so that users can't pair with other devices. When set to **Not configured** (default), Intune doesn't change or update this setting. By default, the OS might enable Bluetooth on the device.
83
+
-**Disable Bluetooth**: Disables Bluetooth on the device so that users can't pair with other devices. When set to **Not configured** (default), Intune doesn't change or update this setting. By default, the OS might enable Bluetooth on the device.
86
84
87
-
-**Block Bluetooth configuration**: Prevents users from configuring Bluetooth on the device. When set to **Not configured** (default), Intune doesn't change or update this setting. By default, the OS might allow users to configure Bluetooth.
85
+
-**Block Bluetooth configuration**: Prevents users from configuring Bluetooth on the device. When set to **Not configured** (default), Intune doesn't change or update this setting. By default, the OS might allow users to configure Bluetooth.
88
86
89
87
-**Allow users to turn on debugging features**: Permits users to access the debugging features on the device. When set to **Not configured** (default), Intune doesn't change or update this setting. By default, the OS might prevent users from using the debugging features on the device.
90
88
91
89
## Next steps
92
90
93
-
-[Create an Android (AOSP) device compliance policy](../protect/compliance-policy-create-android-aosp.md).
94
-
91
+
-[Create an Android (AOSP) device compliance policy](../protect/compliance-policy-create-android-aosp.md).
95
92
-[Add actions for noncompliant devices](../protect/actions-for-noncompliance.md).
Copy file name to clipboardExpand all lines: memdocs/intune/configuration/device-restrictions-android-for-work.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
# required metadata
3
3
4
-
title: Android Enterprise device settings in Microsoft Intune
4
+
title: Android Enterprise device restriction settings in Microsoft Intune
5
5
description: On Android Enterprise or Android for Work devices, restrict settings on the device using Microsoft Intune. Restrict copy and paste, notifications, app permissions, data sharing, password length, sign in failures, use fingerprint to unlock, reuse passwords, and enable bluetooth sharing of work contacts. Configure devices as a dedicated device kiosk to run one app, or multiple apps.
Copy file name to clipboardExpand all lines: memdocs/intune/configuration/device-restrictions-configure.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,12 +2,12 @@
2
2
# required metadata
3
3
4
4
title: Restrict devices features using policy in Microsoft Intune
5
-
description: Add a device profile to restrict features on Android device administrator, Android Enterprise, macOS, iOS, iPadOS, and Windows 10/11 client devices in Microsoft Intune and Endpoint Manager.
5
+
description: Add a device configuration profile to restrict features on Android device administrator, Android Enterprise, AOSP, macOS, iOS, iPadOS, and Windows 10/11 client devices in Microsoft Intune and Endpoint Manager.
6
6
keywords:
7
7
author: MandiOhlinger
8
8
ms.author: mandia
9
9
manager: dougeby
10
-
ms.date: 01/18/2022
10
+
ms.date: 09/20/2022
11
11
ms.topic: how-to
12
12
ms.service: microsoft-intune
13
13
ms.subservice: configuration
@@ -44,8 +44,8 @@ These features are available in Intune, and are configurable by the administrato
44
44
This feature applies to:
45
45
46
46
- Android device administrator
47
-
- Android (AOSP) (preview)
48
-
- Android Enterprise personally-owned devices with a work profile
47
+
- Android Open Source Project (AOSP)
48
+
- Android Enterprise personallyowned devices with a work profile
49
49
- iOS/iPadOS
50
50
- macOS
51
51
- Windows 11
@@ -63,7 +63,7 @@ This article shows you how to create a device restrictions profile. You can also
63
63
-**Platform**: Choose the platform of your devices. Your options:
64
64
65
65
-**Android device administrator**
66
-
-**Android (AOSP)** (preview)
66
+
-**Android (AOSP)**
67
67
-**Android Enterprise**
68
68
-**iOS/iPadOS**
69
69
-**macOS**
@@ -85,7 +85,7 @@ This article shows you how to create a device restrictions profile. You can also
85
85
7. In **Configuration settings**, depending on the platform you chose, the settings you can configure are different. Choose your platform for detailed settings:
# Set up Intune enrollment for Android (AOSP) corporate-owned user-associated devices
33
33
34
-
> [!IMPORTANT]
35
-
> This feature is in [public preview](../fundamentals/public-preview.md).
36
-
37
34
Set up enrollment in Intune for corporate-owned, user-associated devices built on the Android Open Source Project (AOSP) platform. Intune offers an *Android (AOSP)* device management solution for corporate-owned Android devices that are:
# Set up Intune enrollment for Android (AOSP) corporate-owned userless devices
33
33
34
-
*This feature is in public preview.*
35
-
36
34
Set up enrollment in Microsoft Intune for corporate-owned, userless devices built on the Android Open Source Project (AOSP) platform. Intune offers an *Android (AOSP)* device management solution for corporate-owned Android devices that are:
37
35
38
36
* Not integrated with Google Mobile Services.
@@ -41,9 +39,6 @@ Set up enrollment in Microsoft Intune for corporate-owned, userless devices buil
41
39
42
40
This article describes how to set up Android (AOSP) device management and enroll RealWear devices for use at work.
43
41
44
-
> [!IMPORTANT]
45
-
> This feature is in [public preview](../fundamentals/public-preview.md).
Copy file name to clipboardExpand all lines: memdocs/intune/enrollment/android-enroll.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ keywords:
8
8
author: Lenewsad
9
9
ms.author: lanewsad
10
10
manager: dougeby
11
-
ms.date: 02/01/2022
11
+
ms.date: 09/20/2022
12
12
ms.topic: overview
13
13
ms.service: microsoft-intune
14
14
ms.subservice: enrollment
@@ -37,12 +37,12 @@ ms.collection:
37
37
38
38
As an Intune administrator, you can enroll Android devices in the following ways:
39
39
- Android Enterprise (offering a set of enrollment options that provide users with the most up-to-date and secure features):
40
-
-[**Android Enterprise personally-owned with a work profile**](android-work-profile-enroll.md): For personal devices granted permission to access corporate data. Admins can manage work accounts, apps, and data. Personal data on the device is kept separate from work data and admins don't control personal settings or data.
40
+
-[**Android Enterprise personallyowned with a work profile**](android-work-profile-enroll.md): For personal devices granted permission to access corporate data. Admins can manage work accounts, apps, and data. Personal data on the device is kept separate from work data and admins don't control personal settings or data.
41
41
-[**Android Enterprise dedicated**](android-kiosk-enroll.md): For corporate-owned, single use devices, such as digital signage, ticket printing, or inventory management. Admins lock down the usage of a device for a limited set of apps and web links. It also prevents users from adding other apps or taking other actions on the device.
42
-
-[**Android Enterprise fully managed**](android-fully-managed-enroll.md): For corporate-owned, single user devices used exclusively for work and not personal use. Admins can manage the entire device and enforce policy controls unavailable to personally-owned/corporate-owned work profiles.
42
+
-[**Android Enterprise fully managed**](android-fully-managed-enroll.md): For corporate-owned, single user devices used exclusively for work and not personal use. Admins can manage the entire device and enforce policy controls unavailable to personallyowned/corporate-owned work profiles.
43
43
-[**Android Enterprise corporate-owned with a work profile**](android-corporate-owned-work-profile-enroll.md): For corporate-owned, single user devices intended for corporate and personal use.
44
44
-[**Android device administrator**](android-enroll-device-administrator.md), including Samsung Knox Standard devices and [Zebra devices](../configuration/android-zebra-mx-overview.md). Device administrator should be used in areas where Android Enterprise or Google Mobile Services (GMS) is unavailable. Google has decreased support for device administrator (DA) management in areas where Android Enterprise is available, and encourages organizations to migrate to Android Enterprise device management. For a list of countries that support Android Enterprise, see [Is Android Enterprise available in my country](https://support.google.com/work/android/answer/6270910)?
45
-
- Android (AOSP), currently in public preview, offers a set of enrollment options for devices that aren't integrated with Google Mobile services.
45
+
- Android (AOSP) offers a set of enrollment options for devices that aren't integrated with Google Mobile services.
46
46
-[Corporate-owned, user associated devices](android-aosp-corporate-owned-user-associated-enroll.md): For corporate-owned, single user devices intended exclusively for work and not personal use. Admins can manage the entire device.
47
47
-[Corporate-owned, userless devices](android-aosp-corporate-owned-userless-enroll.md): For corporate-owned, shared devices. Admins can manage the entire device.
48
48
@@ -61,7 +61,7 @@ For Samsung Knox Standard devices, there are [more prerequisites](android-samsun
61
61
62
62
## Next steps
63
63
64
-
-[Set up Android Enterprise personally-owned work profile enrollment](android-work-profile-enroll.md)
64
+
-[Set up Android Enterprise personallyowned work profile enrollment](android-work-profile-enroll.md)
65
65
-[Set up Android Enterprise dedicated device enrollment](android-kiosk-enroll.md)
66
66
-[Set up Android Enterprise fully managed enrollment](android-fully-managed-enroll.md)
67
67
-[Set up Android device administrator enrollment](android-enroll-device-administrator.md)
This article provides recommendations on the Android enrollment methods. It also includes an overview of the administrator and user tasks for each enrollment type.
@@ -227,7 +227,7 @@ The specific steps depend on how you configured the enrollment profile. For the
227
227
> [!NOTE]
228
228
> Currently, there's limited OEM support for this enrollment method.
229
229
230
-
Also referred to as AOSP. Currently in [public preview](public-preview.md). These devices are organization-owned, and don't use Google Mobile Services (GMS). They can be kiosk-style devices that aren't associated with a single or specific user, or can have one user. They're used exclusively for organization work; not personal use.
230
+
Also referred to as AOSP. These devices are organization-owned, and don't use Google Mobile Services (GMS). They can be kiosk-style devices that aren't associated with a single or specific user, or can have one user. They're used exclusively for organization work; not personal use.
231
231
232
232
When you create the Intune enrollment profile, you decide if the devices are userless, or are associated with a single user. For more information on these options, including supported OEMs, see:
0 commit comments