Skip to content

Commit 0ea3664

Browse files
authored
Merge pull request #8297 from MicrosoftDocs/main
Publish main to live on 8/22 @ 10:30 am
2 parents 2889a53 + 107d27f commit 0ea3664

4 files changed

Lines changed: 22 additions & 179 deletions

File tree

memdocs/intune/configuration/android-oem-configuration-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -140,7 +140,7 @@ Be sure the device supports OEMConfig, the correct OEMConfig app is added to Int
140140

141141
Select **Next**.
142142

143-
11. In **Assignments**, select the users or groups that will receive your profile. Assign one profile to each device. The OEMConfig model only supports one policy per device.
143+
11. In **Assignments**, select the users or groups that will receive your profile. Assign one profile to each device. The OEMConfig model only supports one policy per device. An OEMConfig profile that exceeds 350kb will not be assigned, and will show a "pending" status.
144144

145145
For more information on assigning profiles, see [Assign user and device profiles](device-profile-assign.md).
146146

memdocs/intune/enrollment/android-dedicated-devices-fully-managed-enroll.md

Lines changed: 19 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -89,16 +89,23 @@ Scan the QR code from the enrollment profile to enroll devices running Android 8
8989

9090
## Enroll by using Google Zero Touch
9191

92-
To use this method, zero-touch enrollment must be supported on devices and affiliated with a supplier that is part of the Android zero-touch enrollment service. For more information, such as prerequisites, where to purchase devices, and how to associate a Google Account with your corporate email, see [Zero-touch enrollment for IT admins](https://support.google.com/work/android/answer/7514005)(opens Android Enterprise Help).
92+
To use this method, zero-touch enrollment must be supported on devices and affiliated with a supplier that is part of the Android zero-touch enrollment service. For more information, such as prerequisites, where to purchase devices, and how to associate a Google Account with your corporate email, see [Zero-touch enrollment for IT admins](https://support.google.com/work/android/answer/7514005) (opens Android Enterprise Help docs).
9393

9494
This section describes how to:
9595
* Create a zero-touch configuration in the admin center
9696
* Create a zero-touch configuration in the zero-touch enrollment portal
9797

9898
### Create zero-touch configuration in admin center
99-
The zero-touch iframe lets you access the zero-touch enrollment portal in the Microsoft Endpoint Manager admin center. To enable the iframe, you must first add the *update app sync* permission and enable enrollment for corporate-owned, fully managed devices. After those steps are complete, the zero-touch enrollment option becomes visible in the admin center and you can link your account and create zero-touch configurations.
99+
The zero-touch iframe gives you access to the zero-touch enrollment portal and zero-touch configurations in the Microsoft Endpoint Manager admin center.
100+
101+
To enable the iframe, you must first add the *update app sync* permission and enable enrollment for corporate-owned, fully managed devices. Once you enable the iframe, you can:
100102

101-
Complete the following steps to enable the iframe and create a new zero-touch configuration. To create configurations in the zero-touch enrollment portal instead, skip to [Create configuration in zero-touch enrollment portal](android-dedicated-devices-fully-managed-enroll.md#create-configuration-in-zero-touch-enrollment-portal).
103+
* Link your zero-touch account to Intune
104+
* Add support information
105+
* Configure zero-touch enabled devices
106+
* Customize provisioning extras
107+
108+
Complete the steps in this section to enable the iframe. To create configurations in the zero-touch enrollment portal instead, skip to [Create configuration in zero-touch enrollment portal](android-dedicated-devices-fully-managed-enroll.md#create-configuration-in-zero-touch-enrollment-portal).
102109

103110
#### Step 1: Add required permission
104111
Add the *update app sync* permission.
@@ -131,18 +138,20 @@ Link a zero-touch account with your Microsoft Intune account. Upon linking the a
131138
3. The iframe opens. Select **Next** to begin setup.
132139
4. Sign in with the Google account you provided to your reseller.
133140
5. Select the zero-touch account you want to link, and then select **Link**.
134-
6. A default configuration is created. A screen appears with basic information about the new configuration. Intune will automatically apply the default to any zero-touch enabled device that's without an existing configuration. Select **Next** to continue.
141+
6. A default configuration is created. A screen appears with basic information about the configuration. Intune will automatically apply the default configuration to any zero-touch enabled device that's without an existing configuration.
135142

136143
> [!TIP]
137-
> The token used for the default configuration is for a fully managed device. If you want to create a zero-touch configuration for a corporate-owned work profile device or a dedicated device, see [Create configuration in zero-touch enrollment portal](android-dedicated-devices-fully-managed-enroll.md#create-configuration-in-zero-touch-enrollment-portal) (in this article).
138-
6. Add support information to assist device users during setup.
139-
7. Select **Save**.
144+
> The token used for the default configuration is meant for a fully managed device. If you want to create a zero-touch configuration for a corporate-owned work profile device or a dedicated device, select **View devices in the zero-touch portal**. For next steps, see [Create configuration in zero-touch enrollment portal](android-dedicated-devices-fully-managed-enroll.md#create-configuration-in-zero-touch-enrollment-portal) in this article.
145+
146+
7. Select **Next** to continue.
147+
8. Add support information to assist device users during setup.
148+
9. Select **Save**.
140149

141-
Once your account is linked with Intune, zero-touch enabled devices are ready to receive the default configuration. You can view existing zero-touch configurations, edit support information, unlink the account, and link other accounts in the admin center.
150+
Once your account is linked with Intune, the default configuration is applied to zero-touch enabled devices that do not already have a configuration. You can view existing zero-touch configurations, edit support information, unlink the account, and link other accounts in the admin center.
142151

143152
### Create configuration in zero-touch enrollment portal
144153

145-
Add a zero-touch configuration in the Google zero-touch enrollment portal. You can use the zero-touch enrollment portal by itself to manage configurations, or you can use it in combination with the zero-touch iframe. The portal supports configurations for fully managed and dedicated devices, and corporate-owned devices with a work profile.
154+
Add a zero-touch configuration in the [zero-touch enrollment portal](https://partner.android.com/zerotouch). You can use the portal by itself to manage configurations, or you can use it in combination with the zero-touch iframe. The portal supports configurations for fully managed and dedicated devices, and corporate-owned devices with a work profile.
146155

147156
1. Sign in to the zero-touch enrollment portal with your Google account.
148157
2. Select the option to add a new configuration.
@@ -162,7 +171,7 @@ Add a zero-touch configuration in the Google zero-touch enrollment portal. You c
162171
"com.google.android.apps.work.clouddpc.EXTRA_ENROLLMENT_TOKEN": "YourEnrollmentToken"
163172
6. Enter your organization's name and support information, which is shown on screen while users set up their devices.
164173

165-
For more information about how to assign a default configuration or apply a configuration in the zero-touch portal, see [Zero-touch enrollment for IT admins](https://support.google.com/work/android/answer/7514005)(opens Android Enterprise Help).
174+
For more information about how to assign a default configuration or apply a configuration in the zero-touch portal, see [Zero-touch enrollment for IT admins](https://support.google.com/work/android/answer/7514005) (opens Android Enterprise Help docs).
166175

167176
## Enroll by using Knox Mobile Enrollment
168177
To use Samsung's Knox Mobile Enrollment, the device must be running Android OS version 8.0 or later and Samsung Knox 2.8 or higher. For more information, learn [how to automatically enroll your devices with Knox Mobile Enrollment](./android-samsung-knox-mobile-enroll.md).

memdocs/intune/fundamentals/in-development.md

Lines changed: 1 addition & 167 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ keywords:
88
author: dougeby
99
ms.author: dougeby
1010
manager: dougeby
11-
ms.date: 07/28/2022
11+
ms.date: 08/19/2022
1212
ms.topic: conceptual
1313
ms.service: microsoft-intune
1414
ms.subservice: fundamentals
@@ -65,9 +65,6 @@ You can use RSS to be notified when this article is updated. For more informatio
6565

6666
## App management
6767

68-
### Noncompliance details available for Android (AOSP) in Microsoft Intune app<!-- 12645770 -->
69-
Android (AOSP) users will be able to view the reasons why devices are marked as noncompliant in the Microsoft Intune app. This information will be available in the Intune app for devices enrolled as user-associated Android (AOSP) devices.
70-
7168
### New app types for Microsoft Endpoint Manager<!-- 7210233 -->
7269
As an admin, you will be able to create and assign two new types of Intune apps:
7370
- **iOS/iPadOS web clip**
@@ -79,20 +76,6 @@ These new app types work in a similar way to the existing **web link** applicati
7976

8077
## Device management
8178

82-
### Reset passcode remote action available for Android (AOSP) Corporate devices<!-- 10247332 -->
83-
You will be able to leverage Reset passcode remote action from the Microsoft Endpoint Manager admin center for Android Open Source Project (AOSP) Corporate devices.
84-
85-
For information on remote actions, see:
86-
- [Reset or remove a device passcode in Intune](../remote-actions/device-passcode-reset.md)
87-
- [Remotely restart devices with Intune](../remote-actions/device-restart.md)
88-
- [Remotely lock devices with Intune](../remote-actions/device-remote-lock.md)
89-
90-
Applies to:
91-
- Android Open Source Project (AOSP)
92-
93-
### View contents of macOS shell scripts and custom attributes<!-- 14757037 -->
94-
You'll be able to view the contents of macOS shell scripts and custom attributes after you upload these to Intune. When this capability is available, you'll be able to view Shell scripts and custom attributes in [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) by selecting **Devices** > **macOS**. For related information, see [Use shell scripts on macOS devices in Intune](../apps/macos-shell-scripts.md).
95-
9679
### Intune moving to support iOS/iPadOS 14 and higher later this year<!-- 14778947 -->
9780
Later this year, Apple is expected to release iOS/iPadOS 16. Due to this expected release, Microsoft Intune and the Intune Company Portal will require iOS/iPadOS 14 and higher shortly after the release of iOS/iPad 16. For related information, see [Supported operating systems and browsers in Intune](../fundamentals/supported-devices-browsers.md).
9881

@@ -103,137 +86,6 @@ With Apple's expected release of macOS 13 Ventura later this year, Microsoft Int
10386

10487
## Device configuration
10588

106-
### iOS/iPadOS settings catalog will support declarative device management<!-- 15016105 -->
107-
On iOS/iPadOS 15+ devices enrolled using [User Enrollment](../enrollment/ios-user-enrollment.md), the settings catalog will be able use Apple’s declarative device management (DDM) when configuring settings.
108-
109-
- No action is required to use DDM. The feature will be built into the settings catalog.
110-
- There is no impact to existing policies in the settings catalog.
111-
- iOS/iPadOS devices that aren't enabled for DDM will continue to use Apple’s standard MDM protocol.
112-
113-
For more information, go to:
114-
- [Meet declarative device management](https://aka.ms/DDM2021) (opens Apple's web site)
115-
- [Microsoft simplifies Endpoint Manager enrollment for Apple updates](https://techcommunity.microsoft.com/t5/microsoft-endpoint-manager-blog/microsoft-simplifies-endpoint-manager-enrollment-for-apple/ba-p/3570319)
116-
- [Use the settings catalog to configure settings on Windows, iOS/iPadOS and macOS devices](../configuration/settings-catalog.md)
117-
118-
Applies to:
119-
- iOS/iPadOS 15 or later devices enrolled using Apple User Enrollment
120-
121-
### New macOS settings available in the Settings Catalog <!-- 15020250 -->
122-
The [Settings Catalog](../configuration/settings-catalog.md) lists all the settings you can configure in a device policy, and all in one place. There are new settings are available in the Settings Catalog (**Devices** > **Configuration profiles** > **Create profile** > **macOS** for platform > **Settings catalog** for profile type).
123-
124-
New settings include:
125-
126-
**Microsoft Auto Update**:
127-
128-
- Current Channel
129-
- Number of minutes for the final countdown timer
130-
131-
**Restrictions**:
132-
133-
- Allow Universal Control
134-
135-
The following settings are also in Settings Catalog. Previously, they were only available in Templates:
136-
137-
**Authentication > Extensible Single Sign On**:
138-
139-
- Extension Data
140-
- Extension Identifier
141-
- Hosts
142-
- Realm
143-
- Screen Locked Behavior
144-
- Team Identifier
145-
- Type
146-
- URLs
147-
148-
**Authentication > Extensible Single Sign On > Extensible Single Sign On Kerberos**:
149-
150-
- Extension Data
151-
- Allow Automatic Login
152-
- Allow Password Change
153-
- Credential Bundle ID ACL
154-
- Credential Use Mode
155-
- Custom Username Label
156-
- Delay User Setup
157-
- Domain Realm Mapping
158-
- Help Text
159-
- Include Kerberos Apps In Bundle ID ACL
160-
- Include Managed Apps In Bundle ID ACL
161-
- Is Default Realm
162-
- Monitor Credentials Cache
163-
- Perform Kerberos Only
164-
- Preferred KDCs
165-
- Principal Name
166-
- Password Change URL
167-
- Password Notification Days
168-
- Password Req Complexity
169-
- Password Req History
170-
- Password Req Length
171-
- Password Req Min Age
172-
- Password Req Text
173-
- Require TLS For LDAP
174-
- Require User Presence
175-
- Site Code
176-
- Sync Local Password
177-
- Use Site Auto Discovery
178-
- Extension Identifier
179-
- Hosts
180-
- Realm
181-
- Team Identifier
182-
- Type
183-
184-
For more information about configuring Settings catalog profiles in Intune, see [Create a policy using settings catalog](../configuration/settings-catalog.md).
185-
186-
Applies to:
187-
- macOS
188-
189-
### New iOS/iPadOS settings in the Settings Catalog<!-- 15020319 -->
190-
The [Settings Catalog](../configuration/settings-catalog.md) lists all the settings you can configure in a device policy, and all in one place. There are new iOS/iPadOS settings available in the Settings Catalog (**Devices** > **Configuration profiles** > **Create profile** > **iOS/iPadOS** for platform > **Settings catalog** for profile type). Previously, these settings were only available in Templates:
191-
192-
**Authentication > Extensible Single Sign On**:
193-
194-
- Extension Data
195-
- Extension Identifier
196-
- Hosts
197-
- Realm
198-
- Screen Locked Behavior
199-
- Team Identifier
200-
- Type
201-
- URLs
202-
203-
**Authentication > Extensible Single Sign On > Extensible Single Sign On Kerberos**:
204-
205-
- Extension Data
206-
- Allow Automatic Login
207-
- Credential Bundle ID ACL
208-
- Domain Realm Mapping
209-
- Help Text
210-
- Include Managed Apps In Bundle ID ACL
211-
- Is Default Realm
212-
- Preferred KDCs
213-
- Principal Name
214-
- Require User Presence
215-
- Site Code
216-
- Use Site Auto Discovery
217-
- Extension Identifier
218-
- Hosts
219-
- Realm
220-
- Team Identifier
221-
- Type
222-
223-
**System Configuration > Lock Screen Message**:
224-
- Asset Tag Information
225-
- Lock Screen Footnote
226-
227-
For more information about configuring Settings catalog profiles in Intune, see [Create a policy using settings catalog](../configuration/settings-catalog.md).
228-
229-
Applies to:
230-
- iOS/iPadOS
231-
232-
### SCEP certificate profile support for Android (ASOP) devices<!-- 8506336 -->
233-
To expand our support for the Android Open Source Project (AOSP) platform, you’ll soon be able to deploy Simple Certificate Enrollment Protocol (SCEP) certificate profiles to corporate-owned and userless devices. In Intune, you can find this functionality in **Devices** > **Configuration profiles** > **Create profile** > **Android (AOSP)**.
234-
235-
This expands on the [certificate profile support](../fundamentals/whats-new.md#certificate-profiles-support-for-android-asop-devices) that was added in June of 2022.
236-
23789
### Filter on the user scope or device scope in the Settings Catalog for Windows devices<!-- 13949975 -->
23890
When you create a Settings Catalog policy, you can use **Add settings** > **Add filter** to filter settings based on the Windows OS edition (**Devices** > **Configuration profiles** > **Create profile** > **Windows 10 and later** for platform > **Settings Catalog (preview)** for profile type).
23991

@@ -245,17 +97,6 @@ Applies to:
24597
- Windows 10
24698
- Windows 11
24799

248-
### Import custom ADMX and ADML administrative templates to create a device configuration profile<!-- 4970862 -->
249-
You can create a device configuration policy that uses built-in ADMX templates (**Devices** > **Configuration profiles** > **Create profile** > **Windows 10 and later** for platform > **Templates** > **Administrative templates**).
250-
251-
You'll be able to import custom and 3rd party/partner ADMX and ADML templates into the Endpoint Manager admin center. Once imported, you can create a device configuration policy, assign the policy to your devices, and manage the settings in the policy.
252-
253-
For information on the built-in ADMX templates, see [Use Windows 10/11 templates to configure group policy settings in Microsoft Intune](../configuration/administrative-templates-windows.md).
254-
255-
Applies to:
256-
- Windows 11
257-
- Windows 10
258-
259100
<!-- ***********************************************-->
260101

261102
## Device security
@@ -277,13 +118,6 @@ Reusable groups will be configured on a new Tab for *Reusable settings* that wil
277118

278119
<!-- ***********************************************-->
279120

280-
## Device enrollment
281-
282-
### Configure zero-touch enrollment in the admin center<!-- 1872357 -->
283-
Configure zero-touch enrollment seamlessly from the admin center. This feature will let you link your zero-touch account to Intune, add support information, configure zero-touch enabled devices with Android Device Policy, and customize provisioning extras.
284-
285-
<!-- ***********************************************-->
286-
287121
## Monitor and troubleshoot
288122

289123
### Open Help and Support without losing your context in the Microsoft Endpoint Manager admin center<!-- 12469338 -->

memdocs/intune/remote-actions/devices-wipe.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ The **Retain enrollment state and user account** option is only available for Wi
5050

5151
MDM policies will be reapplied the next time the device connects to Intune.
5252

53-
A wipe is useful for resetting a device before you give the device to a new user, or when the device has been lost or stolen. Be careful about selecting **Wipe**. Data on the device cannot be recovered. This level of device wipe follows a standard file delete process, rather than a low-level delete.
53+
A wipe is useful for resetting a device before you give the device to a new user, or when the device has been lost or stolen. Be careful about selecting **Wipe**. Data on the device cannot be recovered. The method that "Wipe" uses to remove data is simple file deletion, and the drive is BitLocker decrypted as part of this process.
5454

5555
### Wiping a device
5656

0 commit comments

Comments
 (0)