You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: memdocs/intune/configuration/android-oem-configuration-overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -140,7 +140,7 @@ Be sure the device supports OEMConfig, the correct OEMConfig app is added to Int
140
140
141
141
Select **Next**.
142
142
143
-
11. In **Assignments**, select the users or groups that will receive your profile. Assign one profile to each device. The OEMConfig model only supports one policy per device.
143
+
11. In **Assignments**, select the users or groups that will receive your profile. Assign one profile to each device. The OEMConfig model only supports one policy per device. An OEMConfig profile that exceeds 350kb will not be assigned, and will show a "pending" status.
144
144
145
145
For more information on assigning profiles, see [Assign user and device profiles](device-profile-assign.md).
Copy file name to clipboardExpand all lines: memdocs/intune/enrollment/android-dedicated-devices-fully-managed-enroll.md
+19-10Lines changed: 19 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -89,16 +89,23 @@ Scan the QR code from the enrollment profile to enroll devices running Android 8
89
89
90
90
## Enroll by using Google Zero Touch
91
91
92
-
To use this method, zero-touch enrollment must be supported on devices and affiliated with a supplier that is part of the Android zero-touch enrollment service. For more information, such as prerequisites, where to purchase devices, and how to associate a Google Account with your corporate email, see [Zero-touch enrollment for IT admins](https://support.google.com/work/android/answer/7514005)(opens Android Enterprise Help).
92
+
To use this method, zero-touch enrollment must be supported on devices and affiliated with a supplier that is part of the Android zero-touch enrollment service. For more information, such as prerequisites, where to purchase devices, and how to associate a Google Account with your corporate email, see [Zero-touch enrollment for IT admins](https://support.google.com/work/android/answer/7514005)(opens Android Enterprise Help docs).
93
93
94
94
This section describes how to:
95
95
* Create a zero-touch configuration in the admin center
96
96
* Create a zero-touch configuration in the zero-touch enrollment portal
97
97
98
98
### Create zero-touch configuration in admin center
99
-
The zero-touch iframe lets you access the zero-touch enrollment portal in the Microsoft Endpoint Manager admin center. To enable the iframe, you must first add the *update app sync* permission and enable enrollment for corporate-owned, fully managed devices. After those steps are complete, the zero-touch enrollment option becomes visible in the admin center and you can link your account and create zero-touch configurations.
99
+
The zero-touch iframe gives you access to the zero-touch enrollment portal and zero-touch configurations in the Microsoft Endpoint Manager admin center.
100
+
101
+
To enable the iframe, you must first add the *update app sync* permission and enable enrollment for corporate-owned, fully managed devices. Once you enable the iframe, you can:
100
102
101
-
Complete the following steps to enable the iframe and create a new zero-touch configuration. To create configurations in the zero-touch enrollment portal instead, skip to [Create configuration in zero-touch enrollment portal](android-dedicated-devices-fully-managed-enroll.md#create-configuration-in-zero-touch-enrollment-portal).
103
+
* Link your zero-touch account to Intune
104
+
* Add support information
105
+
* Configure zero-touch enabled devices
106
+
* Customize provisioning extras
107
+
108
+
Complete the steps in this section to enable the iframe. To create configurations in the zero-touch enrollment portal instead, skip to [Create configuration in zero-touch enrollment portal](android-dedicated-devices-fully-managed-enroll.md#create-configuration-in-zero-touch-enrollment-portal).
102
109
103
110
#### Step 1: Add required permission
104
111
Add the *update app sync* permission.
@@ -131,18 +138,20 @@ Link a zero-touch account with your Microsoft Intune account. Upon linking the a
131
138
3. The iframe opens. Select **Next** to begin setup.
132
139
4. Sign in with the Google account you provided to your reseller.
133
140
5. Select the zero-touch account you want to link, and then select **Link**.
134
-
6. A default configuration is created. A screen appears with basic information about the new configuration. Intune will automatically apply the default to any zero-touch enabled device that's without an existing configuration. Select **Next** to continue.
141
+
6. A default configuration is created. A screen appears with basic information about the configuration. Intune will automatically apply the default configuration to any zero-touch enabled device that's without an existing configuration.
135
142
136
143
> [!TIP]
137
-
> The token used for the default configuration is for a fully managed device. If you want to create a zero-touch configuration for a corporate-owned work profile device or a dedicated device, see [Create configuration in zero-touch enrollment portal](android-dedicated-devices-fully-managed-enroll.md#create-configuration-in-zero-touch-enrollment-portal) (in this article).
138
-
6. Add support information to assist device users during setup.
139
-
7. Select **Save**.
144
+
> The token used for the default configuration is meant for a fully managed device. If you want to create a zero-touch configuration for a corporate-owned work profile device or a dedicated device, select **View devices in the zero-touch portal**. For next steps, see [Create configuration in zero-touch enrollment portal](android-dedicated-devices-fully-managed-enroll.md#create-configuration-in-zero-touch-enrollment-portal) in this article.
145
+
146
+
7. Select **Next** to continue.
147
+
8. Add support information to assist device users during setup.
148
+
9. Select **Save**.
140
149
141
-
Once your account is linked with Intune, zero-touch enabled devices are ready to receive the default configuration. You can view existing zero-touch configurations, edit support information, unlink the account, and link other accounts in the admin center.
150
+
Once your account is linked with Intune, the default configuration is applied to zero-touch enabled devices that do not already have a configuration. You can view existing zero-touch configurations, edit support information, unlink the account, and link other accounts in the admin center.
142
151
143
152
### Create configuration in zero-touch enrollment portal
144
153
145
-
Add a zero-touch configuration in the Google zero-touch enrollment portal. You can use the zero-touch enrollment portal by itself to manage configurations, or you can use it in combination with the zero-touch iframe. The portal supports configurations for fully managed and dedicated devices, and corporate-owned devices with a work profile.
154
+
Add a zero-touch configuration in the [zero-touch enrollment portal](https://partner.android.com/zerotouch). You can use the portal by itself to manage configurations, or you can use it in combination with the zero-touch iframe. The portal supports configurations for fully managed and dedicated devices, and corporate-owned devices with a work profile.
146
155
147
156
1. Sign in to the zero-touch enrollment portal with your Google account.
148
157
2. Select the option to add a new configuration.
@@ -162,7 +171,7 @@ Add a zero-touch configuration in the Google zero-touch enrollment portal. You c
6. Enter your organization's name and support information, which is shown on screen while users set up their devices.
164
173
165
-
For more information about how to assign a default configuration or apply a configuration in the zero-touch portal, see [Zero-touch enrollment for IT admins](https://support.google.com/work/android/answer/7514005)(opens Android Enterprise Help).
174
+
For more information about how to assign a default configuration or apply a configuration in the zero-touch portal, see [Zero-touch enrollment for IT admins](https://support.google.com/work/android/answer/7514005)(opens Android Enterprise Help docs).
166
175
167
176
## Enroll by using Knox Mobile Enrollment
168
177
To use Samsung's Knox Mobile Enrollment, the device must be running Android OS version 8.0 or later and Samsung Knox 2.8 or higher. For more information, learn [how to automatically enroll your devices with Knox Mobile Enrollment](./android-samsung-knox-mobile-enroll.md).
Copy file name to clipboardExpand all lines: memdocs/intune/fundamentals/in-development.md
+1-167Lines changed: 1 addition & 167 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ keywords:
8
8
author: dougeby
9
9
ms.author: dougeby
10
10
manager: dougeby
11
-
ms.date: 07/28/2022
11
+
ms.date: 08/19/2022
12
12
ms.topic: conceptual
13
13
ms.service: microsoft-intune
14
14
ms.subservice: fundamentals
@@ -65,9 +65,6 @@ You can use RSS to be notified when this article is updated. For more informatio
65
65
66
66
## App management
67
67
68
-
### Noncompliance details available for Android (AOSP) in Microsoft Intune app<!-- 12645770 -->
69
-
Android (AOSP) users will be able to view the reasons why devices are marked as noncompliant in the Microsoft Intune app. This information will be available in the Intune app for devices enrolled as user-associated Android (AOSP) devices.
70
-
71
68
### New app types for Microsoft Endpoint Manager<!-- 7210233 -->
72
69
As an admin, you will be able to create and assign two new types of Intune apps:
73
70
-**iOS/iPadOS web clip**
@@ -79,20 +76,6 @@ These new app types work in a similar way to the existing **web link** applicati
79
76
80
77
## Device management
81
78
82
-
### Reset passcode remote action available for Android (AOSP) Corporate devices<!-- 10247332 -->
83
-
You will be able to leverage Reset passcode remote action from the Microsoft Endpoint Manager admin center for Android Open Source Project (AOSP) Corporate devices.
84
-
85
-
For information on remote actions, see:
86
-
-[Reset or remove a device passcode in Intune](../remote-actions/device-passcode-reset.md)
87
-
-[Remotely restart devices with Intune](../remote-actions/device-restart.md)
88
-
-[Remotely lock devices with Intune](../remote-actions/device-remote-lock.md)
89
-
90
-
Applies to:
91
-
- Android Open Source Project (AOSP)
92
-
93
-
### View contents of macOS shell scripts and custom attributes<!-- 14757037 -->
94
-
You'll be able to view the contents of macOS shell scripts and custom attributes after you upload these to Intune. When this capability is available, you'll be able to view Shell scripts and custom attributes in [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) by selecting **Devices** > **macOS**. For related information, see [Use shell scripts on macOS devices in Intune](../apps/macos-shell-scripts.md).
95
-
96
79
### Intune moving to support iOS/iPadOS 14 and higher later this year<!-- 14778947 -->
97
80
Later this year, Apple is expected to release iOS/iPadOS 16. Due to this expected release, Microsoft Intune and the Intune Company Portal will require iOS/iPadOS 14 and higher shortly after the release of iOS/iPad 16. For related information, see [Supported operating systems and browsers in Intune](../fundamentals/supported-devices-browsers.md).
98
81
@@ -103,137 +86,6 @@ With Apple's expected release of macOS 13 Ventura later this year, Microsoft Int
103
86
104
87
## Device configuration
105
88
106
-
### iOS/iPadOS settings catalog will support declarative device management<!-- 15016105 -->
107
-
On iOS/iPadOS 15+ devices enrolled using [User Enrollment](../enrollment/ios-user-enrollment.md), the settings catalog will be able use Apple’s declarative device management (DDM) when configuring settings.
108
-
109
-
- No action is required to use DDM. The feature will be built into the settings catalog.
110
-
- There is no impact to existing policies in the settings catalog.
111
-
- iOS/iPadOS devices that aren't enabled for DDM will continue to use Apple’s standard MDM protocol.
112
-
113
-
For more information, go to:
114
-
-[Meet declarative device management](https://aka.ms/DDM2021) (opens Apple's web site)
115
-
-[Microsoft simplifies Endpoint Manager enrollment for Apple updates](https://techcommunity.microsoft.com/t5/microsoft-endpoint-manager-blog/microsoft-simplifies-endpoint-manager-enrollment-for-apple/ba-p/3570319)
116
-
-[Use the settings catalog to configure settings on Windows, iOS/iPadOS and macOS devices](../configuration/settings-catalog.md)
117
-
118
-
Applies to:
119
-
- iOS/iPadOS 15 or later devices enrolled using Apple User Enrollment
120
-
121
-
### New macOS settings available in the Settings Catalog <!-- 15020250 -->
122
-
The [Settings Catalog](../configuration/settings-catalog.md) lists all the settings you can configure in a device policy, and all in one place. There are new settings are available in the Settings Catalog (**Devices** > **Configuration profiles** > **Create profile** > **macOS** for platform > **Settings catalog** for profile type).
123
-
124
-
New settings include:
125
-
126
-
**Microsoft Auto Update**:
127
-
128
-
- Current Channel
129
-
- Number of minutes for the final countdown timer
130
-
131
-
**Restrictions**:
132
-
133
-
- Allow Universal Control
134
-
135
-
The following settings are also in Settings Catalog. Previously, they were only available in Templates:
136
-
137
-
**Authentication > Extensible Single Sign On**:
138
-
139
-
- Extension Data
140
-
- Extension Identifier
141
-
- Hosts
142
-
- Realm
143
-
- Screen Locked Behavior
144
-
- Team Identifier
145
-
- Type
146
-
- URLs
147
-
148
-
**Authentication > Extensible Single Sign On > Extensible Single Sign On Kerberos**:
149
-
150
-
- Extension Data
151
-
- Allow Automatic Login
152
-
- Allow Password Change
153
-
- Credential Bundle ID ACL
154
-
- Credential Use Mode
155
-
- Custom Username Label
156
-
- Delay User Setup
157
-
- Domain Realm Mapping
158
-
- Help Text
159
-
- Include Kerberos Apps In Bundle ID ACL
160
-
- Include Managed Apps In Bundle ID ACL
161
-
- Is Default Realm
162
-
- Monitor Credentials Cache
163
-
- Perform Kerberos Only
164
-
- Preferred KDCs
165
-
- Principal Name
166
-
- Password Change URL
167
-
- Password Notification Days
168
-
- Password Req Complexity
169
-
- Password Req History
170
-
- Password Req Length
171
-
- Password Req Min Age
172
-
- Password Req Text
173
-
- Require TLS For LDAP
174
-
- Require User Presence
175
-
- Site Code
176
-
- Sync Local Password
177
-
- Use Site Auto Discovery
178
-
- Extension Identifier
179
-
- Hosts
180
-
- Realm
181
-
- Team Identifier
182
-
- Type
183
-
184
-
For more information about configuring Settings catalog profiles in Intune, see [Create a policy using settings catalog](../configuration/settings-catalog.md).
185
-
186
-
Applies to:
187
-
- macOS
188
-
189
-
### New iOS/iPadOS settings in the Settings Catalog<!-- 15020319 -->
190
-
The [Settings Catalog](../configuration/settings-catalog.md) lists all the settings you can configure in a device policy, and all in one place. There are new iOS/iPadOS settings available in the Settings Catalog (**Devices** > **Configuration profiles** > **Create profile** > **iOS/iPadOS** for platform > **Settings catalog** for profile type). Previously, these settings were only available in Templates:
191
-
192
-
**Authentication > Extensible Single Sign On**:
193
-
194
-
- Extension Data
195
-
- Extension Identifier
196
-
- Hosts
197
-
- Realm
198
-
- Screen Locked Behavior
199
-
- Team Identifier
200
-
- Type
201
-
- URLs
202
-
203
-
**Authentication > Extensible Single Sign On > Extensible Single Sign On Kerberos**:
204
-
205
-
- Extension Data
206
-
- Allow Automatic Login
207
-
- Credential Bundle ID ACL
208
-
- Domain Realm Mapping
209
-
- Help Text
210
-
- Include Managed Apps In Bundle ID ACL
211
-
- Is Default Realm
212
-
- Preferred KDCs
213
-
- Principal Name
214
-
- Require User Presence
215
-
- Site Code
216
-
- Use Site Auto Discovery
217
-
- Extension Identifier
218
-
- Hosts
219
-
- Realm
220
-
- Team Identifier
221
-
- Type
222
-
223
-
**System Configuration > Lock Screen Message**:
224
-
- Asset Tag Information
225
-
- Lock Screen Footnote
226
-
227
-
For more information about configuring Settings catalog profiles in Intune, see [Create a policy using settings catalog](../configuration/settings-catalog.md).
228
-
229
-
Applies to:
230
-
- iOS/iPadOS
231
-
232
-
### SCEP certificate profile support for Android (ASOP) devices<!-- 8506336 -->
233
-
To expand our support for the Android Open Source Project (AOSP) platform, you’ll soon be able to deploy Simple Certificate Enrollment Protocol (SCEP) certificate profiles to corporate-owned and userless devices. In Intune, you can find this functionality in **Devices** > **Configuration profiles** > **Create profile** > **Android (AOSP)**.
234
-
235
-
This expands on the [certificate profile support](../fundamentals/whats-new.md#certificate-profiles-support-for-android-asop-devices) that was added in June of 2022.
236
-
237
89
### Filter on the user scope or device scope in the Settings Catalog for Windows devices<!-- 13949975 -->
238
90
When you create a Settings Catalog policy, you can use **Add settings** > **Add filter** to filter settings based on the Windows OS edition (**Devices** > **Configuration profiles** > **Create profile** > **Windows 10 and later** for platform > **Settings Catalog (preview)** for profile type).
239
91
@@ -245,17 +97,6 @@ Applies to:
245
97
- Windows 10
246
98
- Windows 11
247
99
248
-
### Import custom ADMX and ADML administrative templates to create a device configuration profile<!-- 4970862 -->
249
-
You can create a device configuration policy that uses built-in ADMX templates (**Devices** > **Configuration profiles** > **Create profile** > **Windows 10 and later** for platform > **Templates** > **Administrative templates**).
250
-
251
-
You'll be able to import custom and 3rd party/partner ADMX and ADML templates into the Endpoint Manager admin center. Once imported, you can create a device configuration policy, assign the policy to your devices, and manage the settings in the policy.
252
-
253
-
For information on the built-in ADMX templates, see [Use Windows 10/11 templates to configure group policy settings in Microsoft Intune](../configuration/administrative-templates-windows.md).
### Configure zero-touch enrollment in the admin center<!-- 1872357 -->
283
-
Configure zero-touch enrollment seamlessly from the admin center. This feature will let you link your zero-touch account to Intune, add support information, configure zero-touch enabled devices with Android Device Policy, and customize provisioning extras.
Copy file name to clipboardExpand all lines: memdocs/intune/remote-actions/devices-wipe.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,7 +50,7 @@ The **Retain enrollment state and user account** option is only available for Wi
50
50
51
51
MDM policies will be reapplied the next time the device connects to Intune.
52
52
53
-
A wipe is useful for resetting a device before you give the device to a new user, or when the device has been lost or stolen. Be careful about selecting **Wipe**. Data on the device cannot be recovered. This level of device wipe follows a standard file delete process, rather than a low-level delete.
53
+
A wipe is useful for resetting a device before you give the device to a new user, or when the device has been lost or stolen. Be careful about selecting **Wipe**. Data on the device cannot be recovered. The method that "Wipe" uses to remove data is simple file deletion, and the drive is BitLocker decrypted as part of this process.
0 commit comments