Skip to content

Commit 0ce23c7

Browse files
authored
Merge pull request #8298 from Erikre/erikre-id2209-15111604
erikre-id2209-15111604
2 parents 41c4b47 + 37122db commit 0ce23c7

1 file changed

Lines changed: 156 additions & 4 deletions

File tree

memdocs/intune/fundamentals/in-development.md

Lines changed: 156 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ keywords:
88
author: dougeby
99
ms.author: dougeby
1010
manager: dougeby
11-
ms.date: 08/19/2022
11+
ms.date: 08/24/2022
1212
ms.topic: conceptual
1313
ms.service: microsoft-intune
1414
ms.subservice: fundamentals
@@ -72,10 +72,24 @@ As an admin, you will be able to create and assign two new types of Intune apps:
7272

7373
These new app types work in a similar way to the existing **web link** application type, however they apply only for their specific platform, whereas web link applications apply across all platforms. With these new app types, you can assign to groups and also use assignment filters to limit the scope of assignment. You will find this functionality in [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), by selecting **Apps** > **All Apps** > **Add**.
7474

75+
### Ending support for Windows 8.1<!-- 14740233 -->
76+
Microsoft Intune will be ending support on October 21, 2022 for devices running Windows 8.1. After that date, technical assistance and automatic updates that help protect your devices running Windows 8.1 will no longer be available. Additionally, because the sideloading scenario for line-of-business apps is only applicable to Windows 8.1 devices, Intune will no longer support Windows 8.1 sideloading. Sideloading is installing, and then running or testing an app that isn't certified by the Microsoft Store. In Windows 10/11, "sideloading" is simply setting a device config policy to include "Trusted app installation". For more information, see [Plan for Change: Ending support for Windows 8.1](../fundamentals/whats-new.md#plan-for-change-ending-support-for-windows-81-).
77+
7578
<!-- ***********************************************-->
7679

7780
## Device management
7881

82+
### Support for Locate device on Android Enterprise corporate owned fully managed and Android Enterprise corporate owned work profile devices<!-- 12391424 -->
83+
You'll be able to use "Locate device" on Android Enterprise corporate owned fully managed and Android Enterprise corporate owned work profile devices. Using this feature, admins will be able to locate lost or stolen corporate devices on-demand. To do this, in [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Devices**, and then select **All devices**. From the list of devices you manage, select a supported device, and choose the **Locate device** remote action.
84+
85+
For information on locating lost or stolen devices with Intune, go to:
86+
- [Locate lost or stolen devices with Intune](../remote-actions/device-locate.md)
87+
88+
Applies to:
89+
- Android Enterprise corporate owned fully managed
90+
- Android Enterprise corporate owned dedicated devices
91+
- Android Enterprise corporate owned work profile
92+
7993
### Intune moving to support iOS/iPadOS 14 and higher later this year<!-- 14778947 -->
8094
Later this year, Apple is expected to release iOS/iPadOS 16. Due to this expected release, Microsoft Intune and the Intune Company Portal will require iOS/iPadOS 14 and higher shortly after the release of iOS/iPad 16. For related information, see [Supported operating systems and browsers in Intune](../fundamentals/supported-devices-browsers.md).
8195

@@ -84,8 +98,138 @@ With Apple's expected release of macOS 13 Ventura later this year, Microsoft Int
8498

8599
<!-- ***********************************************-->
86100

101+
## Device enrollment
102+
103+
### Windows Autopilot diagnostics will capture ESP failures<!-- 1895390 -->
104+
Windows Autopilot diagnostics will automatically capture diagnostics about Windows Autopilot failures that occur on the Enrollment Status Page (ESP). Diagnostics will be available to download in the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
105+
106+
<!-- ***********************************************-->
107+
87108
## Device configuration
88109

110+
### New settings available in the iOS/iPadOS and macOS Settings Catalog<!-- 15349701 -->
111+
The [Settings Catalog](../configuration/settings-catalog.md) lists all the settings you can configure in a device policy, and all in one place. There are new settings are available in the Settings Catalog. In [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), you'll be able to find these settings by selecting **Devices** > **Configuration profiles** > **Create profile** > **iOS/iPadOS** or **macOS** for platform > **Settings catalog** for profile type.
112+
113+
New settings include:
114+
115+
**Accounts > LDAP**:
116+
117+
- LDAP Account Description
118+
- LDAP Account Host Name
119+
- LDAP Account Password
120+
- LDAP Account Use SSL
121+
- LDAP Account User Name
122+
- LDAP Search Settings
123+
124+
Applies to:
125+
- iOS/iPadOS
126+
- macOS
127+
128+
The following settings are also in Settings Catalog. Previously, they were only available in Templates:
129+
130+
**Privacy > Privacy Preferences Policy Control**:
131+
132+
- Accessibility
133+
- Address Book
134+
- Apple Events
135+
- Calendar
136+
- Camera
137+
- File Provider Presence
138+
- Listen Event
139+
- Media Library
140+
- Microphone
141+
- Photos
142+
- Post Event
143+
- Reminders
144+
- Screen Capture
145+
- Speech Recognition
146+
- System Policy All Files
147+
- System Policy Desktop Folder
148+
- System Policy Documents Folder
149+
- System Policy Downloads Folder
150+
- System Policy Network Volumes
151+
- System Policy Removable Volumes
152+
- System Policy Sys Admin Files
153+
154+
Applies to:
155+
- macOS
156+
157+
For more information about configuring Settings Catalog profiles in Intune, see [Create a policy using settings catalog](../configuration/settings-catalog.md).
158+
159+
### Filter app and group policy assignments using Windows 11 SE operating system SKUs<!-- 10588651 -->
160+
When you assign an app or policy, you can filter the assignment using different device properties, such as device manufacturer, operating system SKU, and more.
161+
162+
Two new Windows 11 SE operating system SKU's will added. You'll be able to use these SKUs in your assignment filters to include or exclude Windows 11 SE devices from applying group-targeted policies and applications.
163+
164+
For more information on filters and the device properties you can currently use, go to:
165+
- [Use filters when assigning your apps, policies, and profiles in Microsoft Endpoint Manager](filters.md)
166+
- [Device properties, operators, and rule editing when creating filters in Microsoft Endpoint Manager](filters-device-properties.md)
167+
168+
Applies to:
169+
- Windows 11 SE
170+
171+
### New lock screen message when adding custom support information to Android Enterprise devices<!-- 13158348 -->
172+
On Android Enterprise devices, you can create a device restrictions configuration profile that shows a custom support message on the devices. You'll be able to configure this in [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) by selecting **Devices** > **Configuration profiles** > **Create profile** > **Android Enterprise** > **Fully managed, dedicated, and corporate-owned work profile** for platform > **Device restrictions** for profile type > **Custom support information**.
173+
174+
There will be a new setting you can configure:
175+
- **Lock screen message**: Add a message that's shown on the device lock screen.
176+
177+
When you configure the **Lock screen message**, you can also use the following device tokens to show device-specific information:
178+
179+
- `{{AADDeviceId}}`: Azure AD device ID
180+
- `{{AccountId}}`: Intune tenant ID or account ID
181+
- `{{DeviceId}}`: Intune device ID
182+
- `{{DeviceName}}`: Intune device name
183+
- `{{domain}}`: Domain name
184+
- `{{EASID}}`: Exchange Active Sync ID
185+
- `{{IMEI}}`: IMEI of the device
186+
- `{{mail}}`: Email address of the user
187+
- `{{MEID}}`: MEID of the device
188+
- `{{partialUPN}}`: UPN prefix before the @ symbol
189+
- `{{SerialNumber}}`: Device serial number
190+
- `{{SerialNumberLast4Digits}}`: Last 4 digits of the device serial number
191+
- `{{UserId}}`: Intune user ID
192+
- `{{UserName}}`: User name
193+
- `{{userPrincipalName}}`: UPN of the user
194+
195+
> [!NOTE]
196+
> Variables aren't validated in the UI and are case sensitive. As a result, you may see profiles saved with incorrect input. For example, if you enter `{{DeviceID}}`, instead of `{{deviceid}}` or `{{DEVICEID}}`, then the literal string is shown instead of the device's unique ID. Be sure to enter the correct information. All lowercase or all uppercase variables are supported, but not a mix.
197+
198+
To see a list of settings you can currently configure, go to [Android Enterprise device settings to allow or restrict features using Intune](../configuration/device-restrictions-android-for-work.md).
199+
200+
Applies to:
201+
- Android 7.0 and newer
202+
- Android Enterprise corporate owned fully managed
203+
- Android Enterprise corporate owned dedicated devices
204+
- Android Enterprise corporate owned work profile
205+
206+
### New password complexity requirements for Android Enterprise 12+ personally owned devices with a work profile<!-- 12436068 -->
207+
On Android Enterprise 11 and older personally owned devices with a work profile, you can set the **Required password type** and a **Minimum password length** in device configuration profiles and compliance policies.
208+
209+
Google is deprecating these features for Android 12+ personally owned devices with a work profile and replacing them with new password complexity requirements. For more information about this change, go to [Day zero support for Android 13](https://aka.ms/Intune/Android13).
210+
211+
The new **Password complexity** setting will have the following options:
212+
213+
- **Not configured**: Intune doesn't change or update this setting. By default, the OS may not require a password.
214+
- **Low**: Pattern or PIN with repeating (4444) or ordered (1234, 4321, 2468) sequences are blocked.
215+
- **Medium**: PIN with repeating (4444) or ordered (1234, 4321, 2468) sequences are blocked. The length, alphabetic length, or alphanumeric length must be at least 4 characters.
216+
- **High**: PIN with repeating (4444) or ordered (1234, 4321, 2468) sequences are blocked. The length must be at least 8 characters. The alphabetic or alphanumeric length must be at least 6 characters.
217+
218+
If you currently use the **Required password type** and **Minimum password length** settings in your device configuration and compliance policies on Android 12+, then we recommend using the new **Password complexity** setting instead.
219+
220+
If you continue to use the **Required password type** and **Minimum password length** settings, and don't configure the **Password complexity** setting, then new devices running Android 12+ will default to the **High** password complexity.
221+
222+
There is no impact for existing devices with the **Required password type** and **Minimum password length** settings configured.
223+
224+
For more information on the existing settings you can configure, go to:
225+
226+
- [Android Enterprise personally owned devices with a work profile - configuration profile settings list](../configuration/device-restrictions-android-for-work.md#personally-owned-devices-with-a-work-profile)
227+
- [Android Enterprise personally owned devices with a work profile - compliance policy settings list](../protect/compliance-policy-create-android-for-work.md#personally-owned-work-profile)
228+
229+
Applies to:
230+
- Android 12.0 and newer
231+
- Android Enterprise personally owned devices with a work profile
232+
89233
### Filter on the user scope or device scope in the Settings Catalog for Windows devices<!-- 13949975 -->
90234
When you create a Settings Catalog policy, you can use **Add settings** > **Add filter** to filter settings based on the Windows OS edition (**Devices** > **Configuration profiles** > **Create profile** > **Windows 10 and later** for platform > **Settings Catalog (preview)** for profile type).
91235

@@ -101,9 +245,17 @@ Applies to:
101245

102246
## Device security
103247

104-
### Reusable groups of settings for Microsoft Defender Firewall Rules<!-- 5653346, 6009514 -->
105-
106-
You’ll soon be able to add reusable groups of settings to your profiles for Microsoft Defender Firewall Rules. The reusable groups are collections of remote IP addresses and FQDNs that you define one time and can then use with one or more firewall rule profiles. You’ll no longer need to reconfigure the same group of IP addresses in each individual profile that might require them.
248+
### Trend Micro – new Mobile Threat Defense (MTD) partner<!--11017779 -->
249+
You’ll soon be able to use Trend Micro as an integrated Mobile Threat Defense (MTD) partner with Intune. To connect Trend Micro, you’ll configure the Trend Micro MTD connector in the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) at **Tenant administration** > **Connectors and tokens** > **Mobile Threat Defense**.
250+
251+
With Trend Micro as a MTD partner, you’ll be able to control mobile device access to your organization’s resources using conditional access that’s based on risk assessment.
252+
253+
Applies to:
254+
- Android Enterprise
255+
- iOS/iPadOS
256+
257+
### Reusable groups of settings for Microsoft Defender Firewall Rules<!-- 5653346, 6009541 -->
258+
You’ll soon be able to add reusable groups of settings to your profiles for Microsoft Defender Firewall Rules. The reusable groups are collections of remote IP addresses and FQDNs that you define one time and can then use with one or more firewall rule profiles. You’ll no longer need to reconfigure the same group of IP addresses in each individual profile that might require them.
107259

108260
Features of the reusable settings groups will include:
109261
- Add one or more remote IP addresses.

0 commit comments

Comments
 (0)