Skip to content

Commit 1d90505

Browse files
authored
Merge pull request #6471 from Brenduns/9851681-ios-tunnel-mde
2201 - OOB - 9851681 ios tunnel mde
2 parents 2bf16fe + b5ee9b4 commit 1d90505

8 files changed

Lines changed: 218 additions & 126 deletions

File tree

memdocs/intune/configuration/vpn-settings-configure.md

Lines changed: 10 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: MandiOhlinger
88
ms.author: mandia
99
manager: dougeby
10-
ms.date: 01/20/2022
10+
ms.date: 01/31/2022
1111
ms.topic: how-to
1212
ms.service: microsoft-intune
1313
ms.subservice: configuration
@@ -138,14 +138,20 @@ You can create VPN profiles using the following connection types:
138138
- L2TP
139139
- Windows 10/11
140140

141-
- Microsoft Tunnel (standalone client)
141+
- Microsoft Tunnel (standalone client)(preview)
142142
- iOS/iPadOS
143143

144144
- Microsoft Tunnel
145-
- Android Enterprise personally owned devices with a work profile
146-
- Android Enterprise fully managed and corporate-owned work profile
145+
- Android Enterprise personally owned devices with a work profile.
146+
- Android Enterprise fully managed and corporate-owned work profile.
147+
- iOS/iPadOS – As part of a public preview, iOS/iPadOS supports a connection type of *Microsoft Tunnel (preview)*. To use this connection type, you must use the preview version of Microsoft Defender for Endpoint that supports Tunnel on this platform.
147148

148149
> [!Important]
150+
> Prior to support for using Microsoft Defender for Endpoint as the tunnel client app, Microsoft Tunnel used a standalone tunnel client app and a connection type of **Microsoft Tunnel (standalone client)**.
151+
>
152+
> For Android, as of June 14, 2021, both the standalone tunnel app and standalone client connection type are deprecated and drop from support after October 26, 2021.
153+
>
154+
> For iOS/iPadOS, the standalone client app and connection type remain in support while use of Microsoft Defender for Endpoint as the client app with the Microsoft Tunnel connection type are in public preview.
149155
> Prior to support for using Microsoft Defender for Endpoint as the tunnel client app, a standalone tunnel client app was available in preview and used a connection type of **Microsoft Tunnel (standalone client)**. As of June 14, 2021, both the standalone tunnel app and standalone client connection type are deprecated and drop from support after January 31, 2022.
150156
151157
- NetMotion Mobility

memdocs/intune/configuration/vpn-settings-ios.md

Lines changed: 7 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: MandiOhlinger
88
ms.author: mandia
99
manager: dougeby
10-
ms.date: 03/02/2021
10+
ms.date: 11/11/2021
1111
ms.topic: conceptual
1212
ms.service: microsoft-intune
1313
ms.subservice: configuration
@@ -58,14 +58,15 @@ Select the VPN connection type from the following list of vendors:
5858
- **Cisco (IPSec)**
5959
- **Citrix VPN**
6060
- **Citrix SSO**
61-
- **Zscaler**: To use Conditional Access, or allow users to bypass the Zscaler sign in screen, then you must integrate Zscaler Private Access (ZPA) with your Azure AD account. For detailed steps, see the [Zscaler documentation](https://help.zscaler.com/zpa/configuration-guide-microsoft-azure-ad).
61+
- **Zscaler**: To use Conditional Access, or allow users to bypass the Zscaler sign in screen, you must integrate Zscaler Private Access (ZPA) with your Azure AD account. For detailed steps, see the [Zscaler documentation](https://help.zscaler.com/zpa/configuration-guide-microsoft-azure-ad).
6262
- **NetMotion Mobility**
6363
- **IKEv2**: [IKEv2 settings](#ikev2-settings) (in this article) describes the properties.
64-
- **Microsoft Tunnel**
64+
- **Microsoft Tunnel (standalone client)(preview)**: Applicable to the Microsoft Tunnel client app.
65+
- **Microsoft Tunnel (preview)** - Applicable to the preview version of the Microsoft Defender for Endpoint app that includes Tunnel client functionality.
6566
- **Custom VPN**
6667

6768
> [!NOTE]
68-
> Cisco, Citrix, F5, and Palo Alto have announced that their legacy clients don't work on iOS 12. You should migrate to the new apps as soon as possible. For more information, see the [Microsoft Intune Support Team Blog](https://go.microsoft.com/fwlink/?linkid=2013806&clcid=0x409).
69+
> Cisco, Citrix, F5, and Palo Alto have announced that their legacy clients don't work on iOS 12 and later. You should migrate to the new apps as soon as possible. For more information, see the [Microsoft Intune Support Team Blog](https://go.microsoft.com/fwlink/?linkid=2013806&clcid=0x409).
6970
7071
## Base VPN settings
7172

@@ -301,14 +302,11 @@ These settings apply when you choose **Connection type** > **IKEv2**.
301302

302303
## Per-app VPN
303304

304-
These settings apply when you choose **Connection type** > **Microsoft Tunnel (standalone client)**.
305+
These settings apply when you choose **Connection type** > **Microsoft Tunnel (standalone client) (preview)** or **Connection type** > **Microsoft Tunnel (preview)**.
305306

306307
- **Per-app VPN**: **Enable** associates a specific to this VPN connection. When the app runs, traffic automatically routes through the VPN connection. You can associate the VPN profile with an app when you assign the software. For more information, see [How to assign and monitor apps](../apps/apps-deploy.md).
307308

308-
For more information, see [Microsoft Tunnel for Intune](../protect/microsoft-tunnel-overview.md).
309-
310-
> [!Important]
311-
> In preparation for the [public preview of Tunnel client functionality in the Microsoft Defender for Endpoint app](https://aka.ms/defendertunnel), the VPN profile connection type for the Microsoft Tunnel client app has been renamed to **Microsoft Tunnel (standalone client)**. At this time, you should use the **Microsoft Tunnel (standalone client)** connection type, not the **Microsoft Tunnel** connection type.
309+
For more information, see [Microsoft Tunnel for Intune](../protect/microsoft-tunnel-overview.md).
312310

313311
## Proxy
314312

memdocs/intune/fundamentals/in-development.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -82,8 +82,6 @@ We’re adding a new policy under endpoint security Account protection that you
8282

8383
With this capability, when configuring the policy you’ll be able to select users from the Azure AD group picker, or manually add users by their SID.
8484

85-
### Use Microsoft Defender for Endpoint as the Tunnel app for iOS devices (public preview)<!-- 9851681 -->
86-
As part of a public preview, you'll soon be able to use the Microsoft Defender for Endpoint client app as [Microsoft Tunnel app](../protect/microsoft-tunnel-overview.md) for your iOS devices. Eventually, Defender for Endpoint will replace the use of the standalone Tunnel client app for iOS devices as it has for Android devices.
8785

8886
<!-- ***********************************************-->
8987

memdocs/intune/fundamentals/whats-new.md

Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -60,6 +60,20 @@ You can use RSS to be notified when this page is updated. For more information,
6060
### Scripts
6161
-->
6262

63+
## Week of January 31, 2022
64+
65+
### Device security
66+
67+
#### Public preview of Tunnel client functionality in Microsoft Defender for Endpoint app for iOS/iPadOS<!-- 9851681 -->
68+
69+
Microsoft Tunnel client functionality for iOS/iPadOS is migrating into the Microsoft Defender for Endpoint app. With this preview, you can start to use a preview version of Microsoft Defender for Endpoint as the Tunnel app for supported devices. The existing Tunnel client remains available, but will eventually be phased out in favor of the Defender for Endpoint app.
70+
71+
This public preview applies to:
72+
73+
- iOS/iPadOS
74+
75+
For this preview, you download a preview version of Microsoft Defender for Endpoint from the Apple app store, and then migrate supported devices from the standalone Tunnel client app to the preview app. For details, see [Migrate to the Microsoft Defender for Endpoint app](../protect/microsoft-tunnel-migrate-app.md).
76+
6377
## Week of January 24, 2022 (Service release 2201)
6478

6579
### App management

memdocs/intune/protect/media/microsoft-tunnel-migrate-app/defender-app-tabs.png renamed to memdocs/intune/protect/media/microsoft-tunnel-migrate-app/defender-app-android.png

File renamed without changes.

memdocs/intune/protect/microsoft-tunnel-conditional-access.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
---
2-
title: Use the Microsoft Tunnel VPN gateway with Conditional Access policies
2+
title: Use Microsoft Tunnel VPN gateway with Conditional Access policies
33
description: Configure your Azure tenant to support using Conditional Access policies to grant access to the Intune Microsoft Tunnel VPN gateway solution.
44
keywords:
55
author: brenduns
66
ms.author: brenduns
77
manager: dougeby
8-
ms.date: 05/24/2021
8+
ms.date: 01/31/2022
99
ms.topic: how-to
1010
ms.service: microsoft-intune
1111
ms.subservice: protect
@@ -25,11 +25,11 @@ ms.custom: intune-azure
2525
ms.collection: M365-identity-device-management
2626
---
2727

28-
# Use Conditional Access with the Microsoft Tunnel in Intune
28+
# Use Conditional Access with Microsoft Tunnel in Intune
2929

3030
If your Microsoft Intune environment uses both Azure Active Directory (AD) and Conditional Access, you can use Conditional Access policies to gate device access to your Microsoft Tunnel VPN gateway.
3131

32-
To support integration of Conditional Access and the Microsoft Tunnel, you’ll use Azure AD PowerShell to enable your tenant to support Microsoft Tunnel. After enabling your tenant to support Microsoft Tunnel, you can then create Conditional Access policies that apply to the Microsoft Tunnel app.
32+
To support integration of Conditional Access and Microsoft Tunnel, you’ll use Azure AD PowerShell to enable your tenant to support Microsoft Tunnel. After enabling your tenant to support Microsoft Tunnel, you can then create Conditional Access policies that apply to the Microsoft Tunnel app.
3333

3434
## Provision your tenant
3535

0 commit comments

Comments
 (0)