You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The Android **Fingerprint instead of PIN for access** setting in Intune, which allows the end-user to use [fingerprint authentication](https://developer.android.com/about/versions/marshmallow/android-6.0.html#fingerprint-authentication) instead of a PIN, is being modified. This change will allow you to require end-users to set strong biometrics, as well as require end-users to confirm their app protection policy (APP) PIN if a change in strong biometrics is detected. You can find Android app protection polices in [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) by selecting **Apps** > **App protection policies** > **Create policy** > **Android**. For more information, see [Android app protection policy settings in Microsoft Intune](../apps/app-protection-policy-settings-android.md#access-requirements).
68
69
70
+
#### Noncompliance details available for Android (AOSP) in Microsoft Intune app<!-- 12645770 -->
71
+
Android (AOSP) users can view noncompliance reasons in the Microsoft Intune app. These details describe why a device is marked noncompliant, and are available on the Device details page for devices enrolled as user-associated Android (AOSP) devices.
72
+
73
+
### Intune apps
74
+
75
+
#### Newly available protected apps for Intune<!-- 14709109, 14955442, 14981985 -->
76
+
The following protected apps are now available for Microsoft Intune:
77
+
- Nexis Newsdesk Mobile by LexisNexis
78
+
- My Portal by MangoApps (Android)
79
+
- Re:Work Enterprise by 9Folders, Inc.
80
+
81
+
For more information about protected apps, see [Microsoft Intune protected apps](../apps/apps-supported-intune-apps.md).
82
+
83
+
### Device enrollment
84
+
85
+
#### Configure zero-touch enrollment from Microsoft Endpoint Manager admin center<!-- 1872357 -->
86
+
Now you can configure Android zero-touch enrollment from the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431). This feature lets you link your zero-touch account to Intune, add support information, configure zero-touch enabled devices, and customize provisioning extras. For more information about how to enable zero-touch from the admin center, see [Enroll by using Google Zero Touch](../enrollment/android-dedicated-devices-fully-managed-enroll.md#enroll-by-using-google-zero-touch).
87
+
88
+
### Device management
89
+
90
+
#### Custom settings for Windows 10/11 device compliance is now generally available<!-- 12862904 -->
91
+
Support to [create custom compliance policy settings](../protect/compliance-use-custom-settings.md) for Windows devices using PowerShell scripts, and to create custom compliance rules and remediation messages that appear in the Company Portal, is now generally available.
92
+
93
+
Applies to:
94
+
- Windows 10/11
95
+
96
+
#### View contents of macOS shell scripts and custom attributes<!-- 14757037 -->
97
+
You can view the contents of macOS shell scripts and custom attributes after you upload these to Intune. You can view Shell scripts and custom attributes in [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) by selecting **Devices** > **macOS**. For related information, see [Use shell scripts on macOS devices in Intune](../apps/macos-shell-scripts.md).
98
+
99
+
#### Reset passcode remote action available for Android (AOSP) Corporate devices<!-- 10247332 -->
100
+
You'll be able to leverage Reset passcode remote action from the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) for Android Open Source Project (AOSP) Corporate devices.
101
+
102
+
For information on remote actions, see:
103
+
-[Reset or remove a device passcode in Intune](../remote-actions/device-passcode-reset.md)
104
+
-[Remotely restart devices with Intune](../remote-actions/device-restart.md)
105
+
-[Remotely lock devices with Intune](../remote-actions/device-remote-lock.md)
106
+
107
+
Applies to:
108
+
- Android Open Source Project (AOSP)
109
+
110
+
### Device configuration
111
+
112
+
#### Certificate profiles support for Android (ASOP) devices<!-- 8506336 -->
113
+
You can now use Simple Certificate Enrollment Protocol (SCEP) [certificate profiles](../protect/certificates-configure.md) with corporate-owned and userless devices that run the Android Open Source Project (AOSP) platform.
114
+
115
+
#### Import, create, and manage custom ADMX and ADML administrative templates<!-- 4970862 -->
116
+
You can create a device configuration policy that uses built-in ADMX templates. In [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Devices** > **Configuration profiles** > **Create profile** > **Windows 10 and later** for platform > **Templates** > **Administrative templates**.
117
+
118
+
You can also import custom and third party/partner ADMX and ADML templates into the Endpoint Manager admin center. Once imported, you can create a device configuration policy, assign the policy to your devices, and manage the settings in the policy.
119
+
120
+
For information, go to:
121
+
-[Import custom ADMX and ADML administrative templates into Endpoint Manager](../configuration/administrative-templates-import-custom.md)
122
+
-[Overview: Use Windows 10/11 templates to configure group policy settings in Microsoft Intune](../configuration/administrative-templates-windows.md).
123
+
124
+
Applies to:
125
+
- Windows 11
126
+
- Windows 10
127
+
128
+
#### Add an HTTP proxy to Wi-Fi device configuration profiles on Android Enterprise<!-- 13975609 -->
129
+
On Android Enterprise devices, you can create a Wi-Fi device configuration profile with basic and enterprise settings. In [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Devices** > **Configuration profiles** > **Create profile** > **Android Enterprise** > **Fully Managed, Dedicated, and Corporate-Owned Work Profile** for platform > **Wi-Fi**.
130
+
131
+
When you create the profile, you can configure an HTTP proxy using a PAC file or configure the settings manually. You can configure an HTTP proxy for each Wi-Fi network in your organization.
132
+
133
+
When the profile is ready, you can deploy this profile to your Fully Managed, Dedicated, and Corporate-Owned Work Profile devices.
134
+
135
+
For more information on the Wi-Fi settings you can configure, go to [Add Wi-Fi settings for Android Enterprise dedicated and fully managed devices in Microsoft Intune](../configuration/wi-fi-settings-android-enterprise.md).
136
+
137
+
Applies to:
138
+
- Android Enterprise Fully Managed, Dedicated, and Corporate-Owned Work Profile
On iOS/iPadOS 15+ devices enrolled using [User Enrollment](../enrollment/ios-user-enrollment.md), the settings catalog automatically uses Apple’s declarative device management (DDM) when configuring settings.
142
+
- No action is required to use DDM. The feature is built into the settings catalog.
143
+
- There is no impact to existing policies in the settings catalog.
144
+
- iOS/iPadOS devices that aren't enabled for DDM continue to use Apple’s standard MDM protocol.
145
+
146
+
For more information, go to:
147
+
-[Meet declarative device management](https://aka.ms/DDM2021) (opens Apple's web site)
148
+
-[Microsoft simplifies Endpoint Manager enrollment for Apple updates](https://techcommunity.microsoft.com/t5/microsoft-endpoint-manager-blog/microsoft-simplifies-endpoint-manager-enrollment-for-apple/ba-p/3570319)
149
+
-[Use the settings catalog to configure settings on Windows, iOS/iPadOS and macOS devices](../configuration/settings-catalog.md)
150
+
151
+
Applies to:
152
+
- iOS/iPadOS 15 or later devices enrolled using Apple User Enrollment
153
+
154
+
#### New macOS settings available in the Settings Catalog <!-- 15020250 -->
155
+
The [Settings Catalog](../configuration/settings-catalog.md) lists all the settings you can configure in a device policy, and all in one place. There are new settings are available in the Settings Catalog. In [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Devices** > **Configuration profiles** > **Create profile** > **macOS** for platform > **Settings catalog** for profile type.
156
+
157
+
New settings include:
158
+
159
+
**Microsoft Auto Update**:
160
+
161
+
- Current Channel
162
+
- Number of minutes for the final countdown timer
163
+
164
+
**Restrictions**:
165
+
166
+
- Allow Universal Control
167
+
168
+
The following settings are also in Settings Catalog. Previously, they were only available in Templates:
169
+
170
+
**Authentication > Extensible Single Sign On**:
171
+
172
+
- Extension Data
173
+
- Extension Identifier
174
+
- Hosts
175
+
- Realm
176
+
- Screen Locked Behavior
177
+
- Team Identifier
178
+
- Type
179
+
- URLs
180
+
181
+
**Authentication > Extensible Single Sign On > Extensible Single Sign On Kerberos**:
182
+
183
+
- Extension Data
184
+
- Allow Automatic Login
185
+
- Allow Password Change
186
+
- Credential Bundle ID ACL
187
+
- Credential Use Mode
188
+
- Custom Username Label
189
+
- Delay User Setup
190
+
- Domain Realm Mapping
191
+
- Help Text
192
+
- Include Kerberos Apps In Bundle ID ACL
193
+
- Include Managed Apps In Bundle ID ACL
194
+
- Is Default Realm
195
+
- Monitor Credentials Cache
196
+
- Perform Kerberos Only
197
+
- Preferred KDCs
198
+
- Principal Name
199
+
- Password Change URL
200
+
- Password Notification Days
201
+
- Password Req Complexity
202
+
- Password Req History
203
+
- Password Req Length
204
+
- Password Req Min Age
205
+
- Password Req Text
206
+
- Require TLS For LDAP
207
+
- Require User Presence
208
+
- Site Code
209
+
- Sync Local Password
210
+
- Use Site Auto Discovery
211
+
- Extension Identifier
212
+
- Hosts
213
+
- Realm
214
+
- Team Identifier
215
+
- Type
216
+
217
+
For more information about configuring Settings catalog profiles in Intune, see [Create a policy using settings catalog](../configuration/settings-catalog.md).
218
+
219
+
Applies to:
220
+
- macOS
221
+
222
+
#### New iOS/iPadOS settings in the Settings Catalog<!-- 15020319 -->
223
+
The [Settings Catalog](../configuration/settings-catalog.md) lists all the settings you can configure in a device policy, and all in one place. There are new iOS/iPadOS settings available in the Settings Catalog. In [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Devices** > **Configuration profiles** > **Create profile** > **iOS/iPadOS** for platform > **Settings catalog** for profile type. Previously, these settings were only available in Templates:
224
+
225
+
**Authentication > Extensible Single Sign On**:
226
+
227
+
- Extension Data
228
+
- Extension Identifier
229
+
- Hosts
230
+
- Realm
231
+
- Screen Locked Behavior
232
+
- Team Identifier
233
+
- Type
234
+
- URLs
235
+
236
+
**Authentication > Extensible Single Sign On > Extensible Single Sign On Kerberos**:
237
+
238
+
- Extension Data
239
+
- Allow Automatic Login
240
+
- Credential Bundle ID ACL
241
+
- Domain Realm Mapping
242
+
- Help Text
243
+
- Include Managed Apps In Bundle ID ACL
244
+
- Is Default Realm
245
+
- Preferred KDCs
246
+
- Principal Name
247
+
- Require User Presence
248
+
- Site Code
249
+
- Use Site Auto Discovery
250
+
- Extension Identifier
251
+
- Hosts
252
+
- Realm
253
+
- Team Identifier
254
+
- Type
255
+
256
+
**System Configuration > Lock Screen Message**:
257
+
- Asset Tag Information
258
+
- Lock Screen Footnote
259
+
260
+
For more information about configuring Settings catalog profiles in Intune, see [Create a policy using settings catalog](../configuration/settings-catalog.md).
261
+
262
+
Applies to:
263
+
- iOS/iPadOS
264
+
265
+
### Monitor and troubleshoot
266
+
267
+
#### Open Help and Support without losing your context in the Microsoft Endpoint Manager admin center<!-- 12469338 -->
268
+
You can now use the **?** icon in the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) to open a [help and support](../../get-support.md) session without losing your current node of focus in the admin center. The **?** icon is always available in the upper right of the title bar of the admin center. This change adds an additional method for accessing *Help and support*.
269
+
270
+
When you select **?**, the admin center opens the help and support view in a new and separate side-by-side pane. By opening this separate pane, you’ll be free to navigate the support experience without affecting your original location and focus on the admin center.
271
+
272
+
#### New noncompliant devices and settings report<!-- 13532817 -->
273
+
In **Reports** > **Device Compliance** > **Reports**, there's a new **Noncompliant devices and settings** organization report. This report:
274
+
- Lists each noncompliant device.
275
+
- For each noncompliant device, it shows the compliance policy settings that the devices aren't compliant with.
276
+
277
+
For more information on this report, go to [Noncompliant devices and settings report (Organizational)](reports.md#noncompliant-devices-and-settings-report-organizational).
278
+
69
279
## Week of August 1, 2022
70
280
71
281
### Device security
@@ -89,7 +299,7 @@ The Company Portal for Windows now allows users to select multiple apps and inst
89
299
You can now initiate a compliance check for your AOSP devices from the Microsoft Intune app. Go to **Device details**. This feature is available on devices that are enrolled via the Microsoft Intune app as user-associated (Android) AOSP devices.
90
300
91
301
#### Monitor bootstrap escrow status on a Mac<!-- 12404441 -->
92
-
Monitor the bootstrap token escrow status for an enrolled Mac in the admin center. A new hardware property in Intune, called *Bootstrap token escrowed*, reports whether or not a bootstrap token has been escrowed in Intune. For more information about bootstrap token support for macOS, see [Bootstrap tokens](../enrollment/macos-enroll.md#bootstrap-tokens).
302
+
Monitor the bootstrap token escrow status for an enrolled Mac in the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431). A new hardware property in Intune, called *Bootstrap token escrowed*, reports whether or not a bootstrap token has been escrowed in Intune. For more information about bootstrap token support for macOS, see [Bootstrap tokens](../enrollment/macos-enroll.md#bootstrap-tokens).
93
303
94
304
#### Enable Common Criteria mode for Android Enterprise devices<!-- 13158881 -->
95
305
For Android Enterprise devices, you can use a new setting, **Common Criteria mode**, to enable an elevated set of security standards that are typically used by only highly sensitive organizations, such as government establishments.
@@ -116,7 +326,7 @@ Learn more about Common Criteria:
116
326
-[Knox Deep Dive: Common Criteria Mode](https://www.samsungknox.com/blog/knox-deep-dive-common-criteria-mode) at samsungknox.com
117
327
118
328
#### New hardware detail available for individual devices running on iOS/iPadOS and macOS<!-- 9598434 -->
119
-
Select**Devices** > **All devices** > *select one of your listed devices* and open it's **Hardware** details. The following new detail is available in the **Hardware** pane of individual devices:
329
+
In [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select**Devices** > **All devices** > *select one of your listed devices* and open it's **Hardware** details. The following new detail is available in the **Hardware** pane of individual devices:
120
330
-**Product name**: Shows the product name of the device, such as iPad8,12. Available for iOS/iPadOS and macOS devices.
121
331
122
332
For more information, see [View device details with Microsoft Intune](../remote-actions/device-inventory.md).
0 commit comments