Skip to content

Commit 10b4a99

Browse files
Merge pull request #8254 from Erikre/erikre-wn2208-15111546
Erikre-wn2208-15111546
2 parents e6b22c9 + 7138151 commit 10b4a99

1 file changed

Lines changed: 214 additions & 4 deletions

File tree

memdocs/intune/fundamentals/whats-new.md

Lines changed: 214 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: Erikre
88
ms.author: erikre
99
manager: dougeby
10-
ms.date: 08/15/2022
10+
ms.date: 08/18/2022
1111
ms.topic: conceptual
1212
ms.service: microsoft-intune
1313
ms.subservice: fundamentals
@@ -59,13 +59,223 @@ You can use RSS to be notified when this page is updated. For more information,
5959
### Role-based access control
6060
### Scripts
6161
-->
62-
## Week of August 15, 2022
62+
63+
## Week of August 15, 2022 (Service release 2208)
6364

6465
### App management
6566

6667
#### Android strong biometric change detection<!-- 9740832 -->
6768
The Android **Fingerprint instead of PIN for access** setting in Intune, which allows the end-user to use [fingerprint authentication](https://developer.android.com/about/versions/marshmallow/android-6.0.html#fingerprint-authentication) instead of a PIN, is being modified. This change will allow you to require end-users to set strong biometrics, as well as require end-users to confirm their app protection policy (APP) PIN if a change in strong biometrics is detected. You can find Android app protection polices in [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) by selecting **Apps** > **App protection policies** > **Create policy** > **Android**. For more information, see [Android app protection policy settings in Microsoft Intune](../apps/app-protection-policy-settings-android.md#access-requirements).
6869

70+
#### Noncompliance details available for Android (AOSP) in Microsoft Intune app<!-- 12645770 -->
71+
Android (AOSP) users can view noncompliance reasons in the Microsoft Intune app. These details describe why a device is marked noncompliant, and are available on the Device details page for devices enrolled as user-associated Android (AOSP) devices.
72+
73+
### Intune apps
74+
75+
#### Newly available protected apps for Intune<!-- 14709109, 14955442, 14981985 -->
76+
The following protected apps are now available for Microsoft Intune:
77+
- Nexis Newsdesk Mobile by LexisNexis
78+
- My Portal by MangoApps (Android)
79+
- Re:Work Enterprise by 9Folders, Inc.
80+
81+
For more information about protected apps, see [Microsoft Intune protected apps](../apps/apps-supported-intune-apps.md).
82+
83+
### Device enrollment
84+
85+
#### Configure zero-touch enrollment from Microsoft Endpoint Manager admin center<!-- 1872357 -->
86+
Now you can configure Android zero-touch enrollment from the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431). This feature lets you link your zero-touch account to Intune, add support information, configure zero-touch enabled devices, and customize provisioning extras. For more information about how to enable zero-touch from the admin center, see [Enroll by using Google Zero Touch](../enrollment/android-dedicated-devices-fully-managed-enroll.md#enroll-by-using-google-zero-touch).
87+
88+
### Device management
89+
90+
#### Custom settings for Windows 10/11 device compliance is now generally available<!-- 12862904 -->
91+
Support to [create custom compliance policy settings](../protect/compliance-use-custom-settings.md) for Windows devices using PowerShell scripts, and to create custom compliance rules and remediation messages that appear in the Company Portal, is now generally available.
92+
93+
Applies to:
94+
- Windows 10/11
95+
96+
#### View contents of macOS shell scripts and custom attributes<!-- 14757037 -->
97+
You can view the contents of macOS shell scripts and custom attributes after you upload these to Intune. You can view Shell scripts and custom attributes in [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) by selecting **Devices** > **macOS**. For related information, see [Use shell scripts on macOS devices in Intune](../apps/macos-shell-scripts.md).
98+
99+
#### Reset passcode remote action available for Android (AOSP) Corporate devices<!-- 10247332 -->
100+
You'll be able to leverage Reset passcode remote action from the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) for Android Open Source Project (AOSP) Corporate devices.
101+
102+
For information on remote actions, see:
103+
- [Reset or remove a device passcode in Intune](../remote-actions/device-passcode-reset.md)
104+
- [Remotely restart devices with Intune](../remote-actions/device-restart.md)
105+
- [Remotely lock devices with Intune](../remote-actions/device-remote-lock.md)
106+
107+
Applies to:
108+
- Android Open Source Project (AOSP)
109+
110+
### Device configuration
111+
112+
#### Certificate profiles support for Android (ASOP) devices<!-- 8506336 -->
113+
You can now use Simple Certificate Enrollment Protocol (SCEP) [certificate profiles](../protect/certificates-configure.md) with corporate-owned and userless devices that run the Android Open Source Project (AOSP) platform.
114+
115+
#### Import, create, and manage custom ADMX and ADML administrative templates<!-- 4970862 -->
116+
You can create a device configuration policy that uses built-in ADMX templates. In [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Devices** > **Configuration profiles** > **Create profile** > **Windows 10 and later** for platform > **Templates** > **Administrative templates**.
117+
118+
You can also import custom and third party/partner ADMX and ADML templates into the Endpoint Manager admin center. Once imported, you can create a device configuration policy, assign the policy to your devices, and manage the settings in the policy.
119+
120+
For information, go to:
121+
- [Import custom ADMX and ADML administrative templates into Endpoint Manager](../configuration/administrative-templates-import-custom.md)
122+
- [Overview: Use Windows 10/11 templates to configure group policy settings in Microsoft Intune](../configuration/administrative-templates-windows.md).
123+
124+
Applies to:
125+
- Windows 11
126+
- Windows 10
127+
128+
#### Add an HTTP proxy to Wi-Fi device configuration profiles on Android Enterprise<!-- 13975609 -->
129+
On Android Enterprise devices, you can create a Wi-Fi device configuration profile with basic and enterprise settings. In [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Devices** > **Configuration profiles** > **Create profile** > **Android Enterprise** > **Fully Managed, Dedicated, and Corporate-Owned Work Profile** for platform > **Wi-Fi**.
130+
131+
When you create the profile, you can configure an HTTP proxy using a PAC file or configure the settings manually. You can configure an HTTP proxy for each Wi-Fi network in your organization.
132+
133+
When the profile is ready, you can deploy this profile to your Fully Managed, Dedicated, and Corporate-Owned Work Profile devices.
134+
135+
For more information on the Wi-Fi settings you can configure, go to [Add Wi-Fi settings for Android Enterprise dedicated and fully managed devices in Microsoft Intune](../configuration/wi-fi-settings-android-enterprise.md).
136+
137+
Applies to:
138+
- Android Enterprise Fully Managed, Dedicated, and Corporate-Owned Work Profile
139+
140+
#### iOS/iPadOS settings catalog supports declarative device management (DDM)<!-- 15016105 -->
141+
On iOS/iPadOS 15+ devices enrolled using [User Enrollment](../enrollment/ios-user-enrollment.md), the settings catalog automatically uses Apple’s declarative device management (DDM) when configuring settings.
142+
- No action is required to use DDM. The feature is built into the settings catalog.
143+
- There is no impact to existing policies in the settings catalog.
144+
- iOS/iPadOS devices that aren't enabled for DDM continue to use Apple’s standard MDM protocol.
145+
146+
For more information, go to:
147+
- [Meet declarative device management](https://aka.ms/DDM2021) (opens Apple's web site)
148+
- [Microsoft simplifies Endpoint Manager enrollment for Apple updates](https://techcommunity.microsoft.com/t5/microsoft-endpoint-manager-blog/microsoft-simplifies-endpoint-manager-enrollment-for-apple/ba-p/3570319)
149+
- [Use the settings catalog to configure settings on Windows, iOS/iPadOS and macOS devices](../configuration/settings-catalog.md)
150+
151+
Applies to:
152+
- iOS/iPadOS 15 or later devices enrolled using Apple User Enrollment
153+
154+
#### New macOS settings available in the Settings Catalog <!-- 15020250 -->
155+
The [Settings Catalog](../configuration/settings-catalog.md) lists all the settings you can configure in a device policy, and all in one place. There are new settings are available in the Settings Catalog. In [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Devices** > **Configuration profiles** > **Create profile** > **macOS** for platform > **Settings catalog** for profile type.
156+
157+
New settings include:
158+
159+
**Microsoft Auto Update**:
160+
161+
- Current Channel
162+
- Number of minutes for the final countdown timer
163+
164+
**Restrictions**:
165+
166+
- Allow Universal Control
167+
168+
The following settings are also in Settings Catalog. Previously, they were only available in Templates:
169+
170+
**Authentication > Extensible Single Sign On**:
171+
172+
- Extension Data
173+
- Extension Identifier
174+
- Hosts
175+
- Realm
176+
- Screen Locked Behavior
177+
- Team Identifier
178+
- Type
179+
- URLs
180+
181+
**Authentication > Extensible Single Sign On > Extensible Single Sign On Kerberos**:
182+
183+
- Extension Data
184+
- Allow Automatic Login
185+
- Allow Password Change
186+
- Credential Bundle ID ACL
187+
- Credential Use Mode
188+
- Custom Username Label
189+
- Delay User Setup
190+
- Domain Realm Mapping
191+
- Help Text
192+
- Include Kerberos Apps In Bundle ID ACL
193+
- Include Managed Apps In Bundle ID ACL
194+
- Is Default Realm
195+
- Monitor Credentials Cache
196+
- Perform Kerberos Only
197+
- Preferred KDCs
198+
- Principal Name
199+
- Password Change URL
200+
- Password Notification Days
201+
- Password Req Complexity
202+
- Password Req History
203+
- Password Req Length
204+
- Password Req Min Age
205+
- Password Req Text
206+
- Require TLS For LDAP
207+
- Require User Presence
208+
- Site Code
209+
- Sync Local Password
210+
- Use Site Auto Discovery
211+
- Extension Identifier
212+
- Hosts
213+
- Realm
214+
- Team Identifier
215+
- Type
216+
217+
For more information about configuring Settings catalog profiles in Intune, see [Create a policy using settings catalog](../configuration/settings-catalog.md).
218+
219+
Applies to:
220+
- macOS
221+
222+
#### New iOS/iPadOS settings in the Settings Catalog<!-- 15020319 -->
223+
The [Settings Catalog](../configuration/settings-catalog.md) lists all the settings you can configure in a device policy, and all in one place. There are new iOS/iPadOS settings available in the Settings Catalog. In [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Devices** > **Configuration profiles** > **Create profile** > **iOS/iPadOS** for platform > **Settings catalog** for profile type. Previously, these settings were only available in Templates:
224+
225+
**Authentication > Extensible Single Sign On**:
226+
227+
- Extension Data
228+
- Extension Identifier
229+
- Hosts
230+
- Realm
231+
- Screen Locked Behavior
232+
- Team Identifier
233+
- Type
234+
- URLs
235+
236+
**Authentication > Extensible Single Sign On > Extensible Single Sign On Kerberos**:
237+
238+
- Extension Data
239+
- Allow Automatic Login
240+
- Credential Bundle ID ACL
241+
- Domain Realm Mapping
242+
- Help Text
243+
- Include Managed Apps In Bundle ID ACL
244+
- Is Default Realm
245+
- Preferred KDCs
246+
- Principal Name
247+
- Require User Presence
248+
- Site Code
249+
- Use Site Auto Discovery
250+
- Extension Identifier
251+
- Hosts
252+
- Realm
253+
- Team Identifier
254+
- Type
255+
256+
**System Configuration > Lock Screen Message**:
257+
- Asset Tag Information
258+
- Lock Screen Footnote
259+
260+
For more information about configuring Settings catalog profiles in Intune, see [Create a policy using settings catalog](../configuration/settings-catalog.md).
261+
262+
Applies to:
263+
- iOS/iPadOS
264+
265+
### Monitor and troubleshoot
266+
267+
#### Open Help and Support without losing your context in the Microsoft Endpoint Manager admin center<!-- 12469338 -->
268+
You can now use the **?** icon in the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) to open a [help and support](../../get-support.md) session without losing your current node of focus in the admin center. The **?** icon is always available in the upper right of the title bar of the admin center. This change adds an additional method for accessing *Help and support*.
269+
270+
When you select **?**, the admin center opens the help and support view in a new and separate side-by-side pane. By opening this separate pane, you’ll be free to navigate the support experience without affecting your original location and focus on the admin center.
271+
272+
#### New noncompliant devices and settings report<!-- 13532817 -->
273+
In **Reports** > **Device Compliance** > **Reports**, there's a new **Noncompliant devices and settings** organization report. This report:
274+
- Lists each noncompliant device.
275+
- For each noncompliant device, it shows the compliance policy settings that the devices aren't compliant with.
276+
277+
For more information on this report, go to [Noncompliant devices and settings report (Organizational)](reports.md#noncompliant-devices-and-settings-report-organizational).
278+
69279
## Week of August 1, 2022
70280

71281
### Device security
@@ -89,7 +299,7 @@ The Company Portal for Windows now allows users to select multiple apps and inst
89299
You can now initiate a compliance check for your AOSP devices from the Microsoft Intune app. Go to **Device details**. This feature is available on devices that are enrolled via the Microsoft Intune app as user-associated (Android) AOSP devices.
90300

91301
#### Monitor bootstrap escrow status on a Mac<!-- 12404441 -->
92-
Monitor the bootstrap token escrow status for an enrolled Mac in the admin center. A new hardware property in Intune, called *Bootstrap token escrowed*, reports whether or not a bootstrap token has been escrowed in Intune. For more information about bootstrap token support for macOS, see [Bootstrap tokens](../enrollment/macos-enroll.md#bootstrap-tokens).
302+
Monitor the bootstrap token escrow status for an enrolled Mac in the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431). A new hardware property in Intune, called *Bootstrap token escrowed*, reports whether or not a bootstrap token has been escrowed in Intune. For more information about bootstrap token support for macOS, see [Bootstrap tokens](../enrollment/macos-enroll.md#bootstrap-tokens).
93303

94304
#### Enable Common Criteria mode for Android Enterprise devices<!-- 13158881 -->
95305
For Android Enterprise devices, you can use a new setting, **Common Criteria mode**, to enable an elevated set of security standards that are typically used by only highly sensitive organizations, such as government establishments.
@@ -116,7 +326,7 @@ Learn more about Common Criteria:
116326
- [Knox Deep Dive: Common Criteria Mode](https://www.samsungknox.com/blog/knox-deep-dive-common-criteria-mode) at samsungknox.com
117327

118328
#### New hardware detail available for individual devices running on iOS/iPadOS and macOS<!-- 9598434 -->
119-
Select **Devices** > **All devices** > *select one of your listed devices* and open it's **Hardware** details. The following new detail is available in the **Hardware** pane of individual devices:
329+
In [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Devices** > **All devices** > *select one of your listed devices* and open it's **Hardware** details. The following new detail is available in the **Hardware** pane of individual devices:
120330
- **Product name**: Shows the product name of the device, such as iPad8,12. Available for iOS/iPadOS and macOS devices.
121331

122332
For more information, see [View device details with Microsoft Intune](../remote-actions/device-inventory.md).

0 commit comments

Comments
 (0)