Skip to content

Commit 0b52c01

Browse files
author
Angela Fleischmann
authored
Merge pull request #8390 from MandiOhlinger/15027949
15027949 - 2209 release: AOSP is GA
2 parents 2445960 + 26eab44 commit 0b52c01

11 files changed

Lines changed: 56 additions & 74 deletions
Lines changed: 18 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
22
# required metadata
33

4-
title: Device restriction settings for Android (AOSP) platform in Microsoft Intune
5-
description: Use Android (AOSP) restriction settings to control a wide range of settings and features on AOSP devices.
4+
title: Device restriction settings for Android (AOSP) in Microsoft Intune
5+
description: On Android Open Source Project (AOSP) devices, restrict settings on the device. You can block the camera, block screenshots, disable bluetooth, block USB file transfer, and more in Microsoft Intune.
66
keywords:
77
author: MandiOhlinger
88
ms.author: mandia
99
manager: dougeby
10-
ms.date: 10/19/2021
10+
ms.date: 09/20/2022
1111
ms.topic: conceptual
1212
ms.service: microsoft-intune
1313
ms.subservice: configuration
@@ -20,28 +20,26 @@ ms.technology:
2020

2121
params:
2222
siblings_only: true
23-
ms.reviewer: mikedano, chmaguir, chrisbal, priyar
23+
ms.reviewer: priyar
2424
ms.suite: ems
2525
search.appverid: MET150
2626
#ms.tgt_pltfrm:
27-
ms.custom: intune-azure, seodec18
27+
ms.custom: intune-azure
2828
ms.collection: M365-identity-device-management
2929
---
3030

3131
# Android (AOSP) device settings to allow or restrict features using Intune
3232

33-
*This feature is in public preview.*
33+
This article describes the different settings you can control on Android (AOSP) devices. You can use these restrictions to configure password requirements and access to device features.
3434

35-
This article describes the different settings you can control on Android (AOSP) devices. You can use these restrictions to configure password requirements and access to device features.
35+
This feature applies to:
3636

37-
This feature applies to the following Android (AOSP) device types:
38-
39-
- Corporate-owned, userless devices (shared)
40-
- Corporate-owned, user-associated devices (single user)
37+
- Android Open Source Project (AOSP) corporate-owned userless devices (shared)
38+
- Android Open Source Project (AOSP) corporate-owned user-associated devices (single user)
4139

4240
## Before you begin
4341

44-
To access these settings, create an [Android (AOSP) device restrictions profile](device-restrictions-configure.md). When prompted to select a **Platform**, choose **Android (AOSP)**.
42+
Create an [AOSP device restrictions profile](device-restrictions-configure.md). For the platform, select **Android (AOSP)**.
4543

4644
## Device password
4745

@@ -53,20 +51,20 @@ To access these settings, create an [Android (AOSP) device restrictions profile]
5351

5452
- **Minimum password length**: Enter the minimum number of digits the password must have, from 4 to 16.
5553

56-
- **Numeric complex**: Does not permit repeat or consecutive numbers, such as `1111` or `1234`. Also enter:
54+
- **Numeric complex**: Doesn't permit repeat or consecutive numbers, such as `1111` or `1234`. Also enter:
5755

5856
- **Minimum password length**: Enter the minimum number of digits or characters a password must have, from 4 to 16.
5957

6058
- **Number of sign-in failures before wiping device**: Enter the number of sign-in attempts allowed, from 4 to 11, before the device is wiped. `0` (zero) might disable the device wipe functionality. When the value is blank, Intune doesn't change or update this setting.
6159

6260
- **Maximum minutes of inactivity until screen locks**: Enter the maximum length of time, from 1 minute to 1 hour, that devices can be idle before the screen is automatically locked. Users must enter their credentials to regain access. For example, enter `5` to lock the device after 5 minutes of inactivity. When the value is blank or set to **Not configured**, Intune doesn't change or update this setting.
6361

64-
> [!NOTE]
62+
> [!NOTE]
63+
>
6564
>- RealWear devices currently only support device default, numeric, and numeric complex password types.
66-
>- The password type **Password required, no restrictions** appears as an option but doesn't currently work on devices, which is a known issue.
67-
65+
>- The password type **Password required, no restrictions** appears as an option but doesn't currently work on devices, which is a known issue.
6866
69-
## General
67+
## General
7068

7169
- **Block access to camera**: Prevents access to the camera on the device. When set to **Not configured** (default), Intune doesn't change or update this setting. By default, the OS might allow access to the camera.
7270

@@ -82,16 +80,13 @@ To access these settings, create an [Android (AOSP) device restrictions profile]
8280

8381
- **Block Wi-Fi setting changes**: Prevents users from creating or changing any Wi-Fi configurations. When set to **Not configured** (default), Intune doesn't change or update this setting. By default, the OS might allow users to change the Wi-Fi settings on the device.
8482

85-
- **Disable Bluetooth**: Disables Bluetooth on the device so that users can't pair with other devices. When set to **Not configured** (default), Intune doesn't change or update this setting. By default, the OS might enable Bluetooth on the device.
83+
- **Disable Bluetooth**: Disables Bluetooth on the device so that users can't pair with other devices. When set to **Not configured** (default), Intune doesn't change or update this setting. By default, the OS might enable Bluetooth on the device.
8684

87-
- **Block Bluetooth configuration**: Prevents users from configuring Bluetooth on the device. When set to **Not configured** (default), Intune doesn't change or update this setting. By default, the OS might allow users to configure Bluetooth.
85+
- **Block Bluetooth configuration**: Prevents users from configuring Bluetooth on the device. When set to **Not configured** (default), Intune doesn't change or update this setting. By default, the OS might allow users to configure Bluetooth.
8886

8987
- **Allow users to turn on debugging features**: Permits users to access the debugging features on the device. When set to **Not configured** (default), Intune doesn't change or update this setting. By default, the OS might prevent users from using the debugging features on the device.
9088

9189
## Next steps
9290

93-
- [Create an Android (AOSP) device compliance policy](../protect/compliance-policy-create-android-aosp.md).
94-
91+
- [Create an Android (AOSP) device compliance policy](../protect/compliance-policy-create-android-aosp.md).
9592
- [Add actions for noncompliant devices](../protect/actions-for-noncompliance.md).
96-
97-

memdocs/intune/configuration/device-restrictions-android-for-work.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
# required metadata
33

4-
title: Android Enterprise device settings in Microsoft Intune
4+
title: Android Enterprise device restriction settings in Microsoft Intune
55
description: On Android Enterprise or Android for Work devices, restrict settings on the device using Microsoft Intune. Restrict copy and paste, notifications, app permissions, data sharing, password length, sign in failures, use fingerprint to unlock, reuse passwords, and enable bluetooth sharing of work contacts. Configure devices as a dedicated device kiosk to run one app, or multiple apps.
66
keywords:
77
author: MandiOhlinger
@@ -42,7 +42,7 @@ This feature applies to:
4242
- Android Enterprise corporate owned fully managed (COBO)
4343
- Android Enterprise corporate owned dedicated devices (COSU)
4444

45-
For Android device administrator, see [Android and Samsung Knox Standard device restrictions](device-restrictions-android.md).
45+
For AOSP, go to [Android (AOSP) device settings to allow or restrict features using Intune](device-restrictions-android-aosp.md).
4646

4747
## Before you begin
4848

memdocs/intune/configuration/device-restrictions-configure.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -2,12 +2,12 @@
22
# required metadata
33

44
title: Restrict devices features using policy in Microsoft Intune
5-
description: Add a device profile to restrict features on Android device administrator, Android Enterprise, macOS, iOS, iPadOS, and Windows 10/11 client devices in Microsoft Intune and Endpoint Manager.
5+
description: Add a device configuration profile to restrict features on Android device administrator, Android Enterprise, AOSP, macOS, iOS, iPadOS, and Windows 10/11 client devices in Microsoft Intune and Endpoint Manager.
66
keywords:
77
author: MandiOhlinger
88
ms.author: mandia
99
manager: dougeby
10-
ms.date: 01/18/2022
10+
ms.date: 09/20/2022
1111
ms.topic: how-to
1212
ms.service: microsoft-intune
1313
ms.subservice: configuration
@@ -44,8 +44,8 @@ These features are available in Intune, and are configurable by the administrato
4444
This feature applies to:
4545

4646
- Android device administrator
47-
- Android (AOSP) (preview)
48-
- Android Enterprise personally-owned devices with a work profile
47+
- Android Open Source Project (AOSP)
48+
- Android Enterprise personally owned devices with a work profile
4949
- iOS/iPadOS
5050
- macOS
5151
- Windows 11
@@ -63,7 +63,7 @@ This article shows you how to create a device restrictions profile. You can also
6363
- **Platform**: Choose the platform of your devices. Your options:
6464

6565
- **Android device administrator**
66-
- **Android (AOSP)** (preview)
66+
- **Android (AOSP)**
6767
- **Android Enterprise**
6868
- **iOS/iPadOS**
6969
- **macOS**
@@ -85,7 +85,7 @@ This article shows you how to create a device restrictions profile. You can also
8585
7. In **Configuration settings**, depending on the platform you chose, the settings you can configure are different. Choose your platform for detailed settings:
8686

8787
- [Android device administrator](device-restrictions-android.md)
88-
- [Android (AOSP)](device-restrictions-android-aosp.md) (in preview)
88+
- [Android (AOSP)](device-restrictions-android-aosp.md)
8989
- [Android Enterprise](device-restrictions-android-for-work.md)
9090
- [iOS/iPadOS](device-restrictions-ios.md)
9191
- [macOS](device-restrictions-macos.md)

memdocs/intune/enrollment/android-aosp-corporate-owned-user-associated-enroll.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ keywords:
88
author: Lenewsad
99
ms.author: lanewsad
1010
manager: dougeby
11-
ms.date: 06/27/2022
11+
ms.date: 09/20/2022
1212
ms.topic: how-to
1313
ms.service: microsoft-intune
1414
ms.subservice: enrollment
@@ -31,9 +31,6 @@ ms.collection: M365-identity-device-management
3131

3232
# Set up Intune enrollment for Android (AOSP) corporate-owned user-associated devices
3333

34-
> [!IMPORTANT]
35-
> This feature is in [public preview](../fundamentals/public-preview.md).
36-
3734
Set up enrollment in Intune for corporate-owned, user-associated devices built on the Android Open Source Project (AOSP) platform. Intune offers an *Android (AOSP)* device management solution for corporate-owned Android devices that are:
3835

3936
* Not integrated with Google Mobile Services.

memdocs/intune/enrollment/android-aosp-corporate-owned-userless-enroll.md

Lines changed: 1 addition & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ keywords:
88
author: Lenewsad
99
ms.author: lanewsad
1010
manager: dougeby
11-
ms.date: 02/23/2022
11+
ms.date: 09/20/2022
1212
ms.topic: how-to
1313
ms.service: microsoft-intune
1414
ms.subservice: enrollment
@@ -31,8 +31,6 @@ ms.collection: M365-identity-device-management
3131

3232
# Set up Intune enrollment for Android (AOSP) corporate-owned userless devices
3333

34-
*This feature is in public preview.*
35-
3634
Set up enrollment in Microsoft Intune for corporate-owned, userless devices built on the Android Open Source Project (AOSP) platform. Intune offers an *Android (AOSP)* device management solution for corporate-owned Android devices that are:
3735

3836
* Not integrated with Google Mobile Services.
@@ -41,9 +39,6 @@ Set up enrollment in Microsoft Intune for corporate-owned, userless devices buil
4139

4240
This article describes how to set up Android (AOSP) device management and enroll RealWear devices for use at work.
4341

44-
> [!IMPORTANT]
45-
> This feature is in [public preview](../fundamentals/public-preview.md).
46-
4742
## Prerequisites
4843

4944
To enroll and manage AOSP devices, you must have:

memdocs/intune/enrollment/android-enroll.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ keywords:
88
author: Lenewsad
99
ms.author: lanewsad
1010
manager: dougeby
11-
ms.date: 02/01/2022
11+
ms.date: 09/20/2022
1212
ms.topic: overview
1313
ms.service: microsoft-intune
1414
ms.subservice: enrollment
@@ -37,12 +37,12 @@ ms.collection:
3737

3838
As an Intune administrator, you can enroll Android devices in the following ways:
3939
- Android Enterprise (offering a set of enrollment options that provide users with the most up-to-date and secure features):
40-
- [**Android Enterprise personally-owned with a work profile**](android-work-profile-enroll.md): For personal devices granted permission to access corporate data. Admins can manage work accounts, apps, and data. Personal data on the device is kept separate from work data and admins don't control personal settings or data.
40+
- [**Android Enterprise personally owned with a work profile**](android-work-profile-enroll.md): For personal devices granted permission to access corporate data. Admins can manage work accounts, apps, and data. Personal data on the device is kept separate from work data and admins don't control personal settings or data.
4141
- [**Android Enterprise dedicated**](android-kiosk-enroll.md): For corporate-owned, single use devices, such as digital signage, ticket printing, or inventory management. Admins lock down the usage of a device for a limited set of apps and web links. It also prevents users from adding other apps or taking other actions on the device.
42-
- [**Android Enterprise fully managed**](android-fully-managed-enroll.md): For corporate-owned, single user devices used exclusively for work and not personal use. Admins can manage the entire device and enforce policy controls unavailable to personally-owned/corporate-owned work profiles.
42+
- [**Android Enterprise fully managed**](android-fully-managed-enroll.md): For corporate-owned, single user devices used exclusively for work and not personal use. Admins can manage the entire device and enforce policy controls unavailable to personally owned/corporate-owned work profiles.
4343
- [**Android Enterprise corporate-owned with a work profile**](android-corporate-owned-work-profile-enroll.md): For corporate-owned, single user devices intended for corporate and personal use.
4444
- [**Android device administrator**](android-enroll-device-administrator.md), including Samsung Knox Standard devices and [Zebra devices](../configuration/android-zebra-mx-overview.md). Device administrator should be used in areas where Android Enterprise or Google Mobile Services (GMS) is unavailable. Google has decreased support for device administrator (DA) management in areas where Android Enterprise is available, and encourages organizations to migrate to Android Enterprise device management. For a list of countries that support Android Enterprise, see [Is Android Enterprise available in my country](https://support.google.com/work/android/answer/6270910)?
45-
- Android (AOSP), currently in public preview, offers a set of enrollment options for devices that aren't integrated with Google Mobile services.
45+
- Android (AOSP) offers a set of enrollment options for devices that aren't integrated with Google Mobile services.
4646
- [Corporate-owned, user associated devices](android-aosp-corporate-owned-user-associated-enroll.md): For corporate-owned, single user devices intended exclusively for work and not personal use. Admins can manage the entire device.
4747
- [Corporate-owned, userless devices](android-aosp-corporate-owned-userless-enroll.md): For corporate-owned, shared devices. Admins can manage the entire device.
4848

@@ -61,7 +61,7 @@ For Samsung Knox Standard devices, there are [more prerequisites](android-samsun
6161

6262
## Next steps
6363

64-
- [Set up Android Enterprise personally-owned work profile enrollment](android-work-profile-enroll.md)
64+
- [Set up Android Enterprise personally owned work profile enrollment](android-work-profile-enroll.md)
6565
- [Set up Android Enterprise dedicated device enrollment](android-kiosk-enroll.md)
6666
- [Set up Android Enterprise fully managed enrollment](android-fully-managed-enroll.md)
6767
- [Set up Android device administrator enrollment](android-enroll-device-administrator.md)

memdocs/intune/fundamentals/deployment-guide-enrollment-android.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: MandiOhlinger
88
ms.author: mandia
99
manager: dougeby
10-
ms.date: 06/08/2022
10+
ms.date: 09/20/2022
1111
ms.topic: conceptual
1212
ms.service: microsoft-intune
1313
ms.subservice: enrollment
@@ -37,7 +37,7 @@ Personal and organization-owned devices can be enrolled in Intune. Once enrolled
3737
- [Android Enterprise corporate owned dedicated devices](#android-enterprise-dedicated-devices) (COSU)
3838
- [Android Enterprise corporate owned fully managed](#android-enterprise-fully-managed) (COBO)
3939
- [Android Enterprise corporate owned work profile](#android-enterprise-corporate-owned-work-profile) (COPE)
40-
- [Android Open Source Project (preview)](#android-open-source-project) (AOSP)
40+
- [Android Open Source Project (AOSP)](#android-open-source-project)
4141
- [Android device administrator](#android-device-administrator) (DA)
4242

4343
This article provides recommendations on the Android enrollment methods. It also includes an overview of the administrator and user tasks for each enrollment type.
@@ -227,7 +227,7 @@ The specific steps depend on how you configured the enrollment profile. For the
227227
> [!NOTE]
228228
> Currently, there's limited OEM support for this enrollment method.
229229
230-
Also referred to as AOSP. Currently in [public preview](public-preview.md). These devices are organization-owned, and don't use Google Mobile Services (GMS). They can be kiosk-style devices that aren't associated with a single or specific user, or can have one user. They're used exclusively for organization work; not personal use.
230+
Also referred to as AOSP. These devices are organization-owned, and don't use Google Mobile Services (GMS). They can be kiosk-style devices that aren't associated with a single or specific user, or can have one user. They're used exclusively for organization work; not personal use.
231231

232232
When you create the Intune enrollment profile, you decide if the devices are userless, or are associated with a single user. For more information on these options, including supported OEMs, see:
233233

0 commit comments

Comments
 (0)