Skip to content

Commit 123ff90

Browse files
committed
erikre-doc-13153248
1 parent e9fda95 commit 123ff90

1 file changed

Lines changed: 102 additions & 2 deletions

File tree

memdocs/intune/fundamentals/in-development.md

Lines changed: 102 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ keywords:
88
author: dougeby
99
ms.author: dougeby
1010
manager: dougeby
11-
ms.date: 01/31/2022
11+
ms.date: 02/01/2022
1212
ms.topic: conceptual
1313
ms.service: microsoft-intune
1414
ms.subservice: fundamentals
@@ -72,9 +72,109 @@ This feature targets devices that operate on Android 11+. For devices that opera
7272

7373
<!-- ***********************************************-->
7474

75+
## Device configuration
76+
77+
### On Android Enterprise, use the Connect Automatically setting on enterprise Wi-Fi profiles<!-- 10697036 -->
78+
79+
On Android Enterprise devices, you can create Wi-Fi profiles that include common enterprise Wi-Fi settings (**Devices** > **Configuration profiles** > **Create profile** > **Android Enterprise** for platform > **Fully Managed, Dedicated, and Corporate-Owned work profile** > **Wi-Fi** for profile type > **Enterprise** for Wi-Fi type).
80+
81+
You can configure the **Connect automatically** setting that automatically connects to your Wi-Fi network when devices are in range.
82+
83+
To see the settings you can currently configure, go to [Add Wi-Fi settings for Android Enterprise dedicated and fully managed devices](../configuration/wi-fi-settings-android-enterprise.md).
84+
85+
Applies to:
86+
87+
- Android Enterprise corporate owned fully managed (COBO)
88+
- Android Enterprise corporate owned dedicated devices (COSU)
89+
90+
### New macOS settings in the Settings Catalog<!-- 12987685 -->
91+
92+
The [Settings Catalog](../configuration/settings-catalog.md) lists all the settings you can configure in a device policy, and all in one place. When you create a Settings Catalog policy, there are new settings available for macOS devices (**Devices** > **Configuration profiles** > **Create profile** > **macOS** for platform > **Settings catalog (preview)** for profile type).
93+
94+
New settings include:
95+
96+
- Accounts > Caldav:
97+
- Cal DAV Account Description
98+
- Cal DAV Host Name
99+
- Cal DAV Password
100+
- Cal DAV Port
101+
- Cal DAV Principal URL
102+
- Cal DAV Username
103+
- Cal DAV Use SSL
104+
105+
- Accounts > Carddav:
106+
- Card DAV Account Description
107+
- Card DAV Host Name
108+
- Card DAV Password
109+
- Card DAV Port
110+
- Card DAV Principal URL
111+
- Card DAV Username
112+
- Card DAV Use SSL
113+
114+
- Networking > Domains > Email Domains
115+
116+
- Printing > Printing:
117+
- Allow Local Printers
118+
- Default Printer
119+
- Device URI
120+
- Display Name
121+
- Footer Font Name
122+
- Footer Font Size
123+
- Print Footer
124+
- Print MAC Address
125+
- Require Admin To Add Printers
126+
- Require Admin To Print Locally
127+
- Show Only Managed Printers
128+
- User Printer List
129+
- Device URI
130+
- Display Name
131+
- Location
132+
- Model
133+
- PPD URL
134+
- Printer Locked
135+
136+
- Profile Removal Password > Removal Password
137+
138+
- Proxies > Global HTTP Proxy:
139+
- Proxy Captive Login Allowed
140+
- Proxy PAC Fallback Allowed
141+
- Proxy PAC URL
142+
- Proxy Password
143+
- Proxy Server
144+
- Proxy Server Port
145+
- Proxy Type
146+
- Proxy Username
147+
148+
For more information about configuring Settings catalog profiles in Intune, see [Create a policy using settings catalog](../configuration/settings-catalog.md).
149+
150+
<!-- ***********************************************-->
151+
152+
## Device enrollment
153+
154+
### Enforce Azure AD terms of use with Microsoft Intune or Microsoft Intune Enrollment cloud apps<!-- 12522105 -->
155+
Use the Microsoft Intune cloud app or Microsoft Intune Enrollment cloud app to enforce a conditional access, Azure AD Terms of Use policy on iOS and iPadOS devices during automated device enrollment. Both apps will ensure that users accept the terms of use before enrolling if required by your conditional access policy. This functionality will be available when you select Setup Assistant with modern authentication as the authentication method.
156+
157+
<!-- ***********************************************-->
158+
159+
## Device management
160+
161+
### Create terms of use for Android (AOSP) user-associated devices<!-- 8506575 -->
162+
Require Android (AOSP) users to accept your organization's terms and conditions before using the Intune Company Portal app. This feature will be available for corporate-owned, user-associated devices only. For more information about creating terms of use in Intune, see [Terms and conditions for user access](../enrollment/terms-and-conditions-create.md).
163+
164+
<!-- ***********************************************-->
165+
75166
## Device security
76167

77-
With this capability, when configuring the policy you’ll be able to select users from the Azure AD group picker, or manually add users by their SID.
168+
### Manage the app inventory data for iOS/iPadOS devices that Intune sends to third-party MTD partners<!-- 10722315 -->
169+
170+
You’ll soon have more control over the application inventory data for personally-owned iOS/iPadOS devices that Intune sends to your chosen third-party Mobile Threat Defense (MTD) partner. You’ll configure what data is sent with a new setting that’s available when you configure the [Mobile Threat Defense connector](../protect/mtd-connector-enable.md#to-enable-the-mobile-threat-defense-connector). The new setting is **Send full application inventory data on personally-owned iOS/iPadOS Devices**.
171+
172+
For personally-owned iOS/iPadOS devices:
173+
174+
- When set to **On**: If your MTD partner syncs app data and requests a list of the iOS/iPadOS applications from Intune, that list includes unmanage apps (those not deployed through Intune) in addition to those deployed through Intune. This is the current behavior.
175+
- When set to **Off**: Data on unmanaged apps won’t be provided, and the MTD partner only receives details about apps that were deployed through Intune.
176+
177+
For corporate devices, data about managed and unmanaged apps continues to be included with requests for app data by your MTD vendor.
78178

79179

80180
<!-- ***********************************************-->

0 commit comments

Comments
 (0)