You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: memdocs/intune/configuration/vpn-settings-configure.md
+10-4Lines changed: 10 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ keywords:
7
7
author: MandiOhlinger
8
8
ms.author: mandia
9
9
manager: dougeby
10
-
ms.date: 01/20/2022
10
+
ms.date: 01/31/2022
11
11
ms.topic: how-to
12
12
ms.service: microsoft-intune
13
13
ms.subservice: configuration
@@ -138,14 +138,20 @@ You can create VPN profiles using the following connection types:
138
138
- L2TP
139
139
- Windows 10/11
140
140
141
-
- Microsoft Tunnel (standalone client)
141
+
- Microsoft Tunnel (standalone client)(preview)
142
142
- iOS/iPadOS
143
143
144
144
- Microsoft Tunnel
145
-
- Android Enterprise personally owned devices with a work profile
146
-
- Android Enterprise fully managed and corporate-owned work profile
145
+
- Android Enterprise personally owned devices with a work profile.
146
+
- Android Enterprise fully managed and corporate-owned work profile.
147
+
- iOS/iPadOS – As part of a public preview, iOS/iPadOS supports a connection type of *Microsoft Tunnel (preview)*. To use this connection type, you must use the preview version of Microsoft Defender for Endpoint that supports Tunnel on this platform.
147
148
148
149
> [!Important]
150
+
> Prior to support for using Microsoft Defender for Endpoint as the tunnel client app, Microsoft Tunnel used a standalone tunnel client app and a connection type of **Microsoft Tunnel (standalone client)**.
151
+
>
152
+
> For Android, as of June 14, 2021, both the standalone tunnel app and standalone client connection type are deprecated and drop from support after October 26, 2021.
153
+
>
154
+
> For iOS/iPadOS, the standalone client app and connection type remain in support while use of Microsoft Defender for Endpoint as the client app with the Microsoft Tunnel connection type are in public preview.
149
155
> Prior to support for using Microsoft Defender for Endpoint as the tunnel client app, a standalone tunnel client app was available in preview and used a connection type of **Microsoft Tunnel (standalone client)**. As of June 14, 2021, both the standalone tunnel app and standalone client connection type are deprecated and drop from support after January 31, 2022.
Copy file name to clipboardExpand all lines: memdocs/intune/configuration/vpn-settings-ios.md
+7-9Lines changed: 7 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ keywords:
7
7
author: MandiOhlinger
8
8
ms.author: mandia
9
9
manager: dougeby
10
-
ms.date: 03/02/2021
10
+
ms.date: 11/11/2021
11
11
ms.topic: conceptual
12
12
ms.service: microsoft-intune
13
13
ms.subservice: configuration
@@ -58,14 +58,15 @@ Select the VPN connection type from the following list of vendors:
58
58
-**Cisco (IPSec)**
59
59
-**Citrix VPN**
60
60
-**Citrix SSO**
61
-
-**Zscaler**: To use Conditional Access, or allow users to bypass the Zscaler sign in screen, then you must integrate Zscaler Private Access (ZPA) with your Azure AD account. For detailed steps, see the [Zscaler documentation](https://help.zscaler.com/zpa/configuration-guide-microsoft-azure-ad).
61
+
-**Zscaler**: To use Conditional Access, or allow users to bypass the Zscaler sign in screen, you must integrate Zscaler Private Access (ZPA) with your Azure AD account. For detailed steps, see the [Zscaler documentation](https://help.zscaler.com/zpa/configuration-guide-microsoft-azure-ad).
62
62
-**NetMotion Mobility**
63
63
-**IKEv2**: [IKEv2 settings](#ikev2-settings) (in this article) describes the properties.
64
-
-**Microsoft Tunnel**
64
+
-**Microsoft Tunnel (standalone client)(preview)**: Applicable to the Microsoft Tunnel client app.
65
+
-**Microsoft Tunnel (preview)** - Applicable to the preview version of the Microsoft Defender for Endpoint app that includes Tunnel client functionality.
65
66
-**Custom VPN**
66
67
67
68
> [!NOTE]
68
-
> Cisco, Citrix, F5, and Palo Alto have announced that their legacy clients don't work on iOS 12. You should migrate to the new apps as soon as possible. For more information, see the [Microsoft Intune Support Team Blog](https://go.microsoft.com/fwlink/?linkid=2013806&clcid=0x409).
69
+
> Cisco, Citrix, F5, and Palo Alto have announced that their legacy clients don't work on iOS 12 and later. You should migrate to the new apps as soon as possible. For more information, see the [Microsoft Intune Support Team Blog](https://go.microsoft.com/fwlink/?linkid=2013806&clcid=0x409).
69
70
70
71
## Base VPN settings
71
72
@@ -301,14 +302,11 @@ These settings apply when you choose **Connection type** > **IKEv2**.
301
302
302
303
## Per-app VPN
303
304
304
-
These settings apply when you choose **Connection type** > **Microsoft Tunnel (standalone client)**.
305
+
These settings apply when you choose **Connection type** > **Microsoft Tunnel (standalone client) (preview)** or **Connection type** > **Microsoft Tunnel (preview)**.
305
306
306
307
-**Per-app VPN**: **Enable** associates a specific to this VPN connection. When the app runs, traffic automatically routes through the VPN connection. You can associate the VPN profile with an app when you assign the software. For more information, see [How to assign and monitor apps](../apps/apps-deploy.md).
307
308
308
-
For more information, see [Microsoft Tunnel for Intune](../protect/microsoft-tunnel-overview.md).
309
-
310
-
> [!Important]
311
-
> In preparation for the [public preview of Tunnel client functionality in the Microsoft Defender for Endpoint app](https://aka.ms/defendertunnel), the VPN profile connection type for the Microsoft Tunnel client app has been renamed to **Microsoft Tunnel (standalone client)**. At this time, you should use the **Microsoft Tunnel (standalone client)** connection type, not the **Microsoft Tunnel** connection type.
309
+
For more information, see [Microsoft Tunnel for Intune](../protect/microsoft-tunnel-overview.md).
Copy file name to clipboardExpand all lines: memdocs/intune/fundamentals/in-development.md
-2Lines changed: 0 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -82,8 +82,6 @@ We’re adding a new policy under endpoint security Account protection that you
82
82
83
83
With this capability, when configuring the policy you’ll be able to select users from the Azure AD group picker, or manually add users by their SID.
84
84
85
-
### Use Microsoft Defender for Endpoint as the Tunnel app for iOS devices (public preview)<!-- 9851681 -->
86
-
As part of a public preview, you'll soon be able to use the Microsoft Defender for Endpoint client app as [Microsoft Tunnel app](../protect/microsoft-tunnel-overview.md) for your iOS devices. Eventually, Defender for Endpoint will replace the use of the standalone Tunnel client app for iOS devices as it has for Android devices.
Copy file name to clipboardExpand all lines: memdocs/intune/fundamentals/whats-new.md
+14Lines changed: 14 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -60,6 +60,20 @@ You can use RSS to be notified when this page is updated. For more information,
60
60
### Scripts
61
61
-->
62
62
63
+
## Week of January 31, 2022
64
+
65
+
### Device security
66
+
67
+
#### Public preview of Tunnel client functionality in Microsoft Defender for Endpoint app for iOS/iPadOS<!-- 9851681 -->
68
+
69
+
Microsoft Tunnel client functionality for iOS/iPadOS is migrating into the Microsoft Defender for Endpoint app. With this preview, you can start to use a preview version of Microsoft Defender for Endpoint as the Tunnel app for supported devices. The existing Tunnel client remains available, but will eventually be phased out in favor of the Defender for Endpoint app.
70
+
71
+
This public preview applies to:
72
+
73
+
- iOS/iPadOS
74
+
75
+
For this preview, you download a preview version of Microsoft Defender for Endpoint from the Apple app store, and then migrate supported devices from the standalone Tunnel client app to the preview app. For details, see [Migrate to the Microsoft Defender for Endpoint app](../protect/microsoft-tunnel-migrate-app.md).
76
+
63
77
## Week of January 24, 2022 (Service release 2201)
Copy file name to clipboardExpand all lines: memdocs/intune/protect/microsoft-tunnel-conditional-access.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,11 +1,11 @@
1
1
---
2
-
title: Use the Microsoft Tunnel VPN gateway with Conditional Access policies
2
+
title: Use Microsoft Tunnel VPN gateway with Conditional Access policies
3
3
description: Configure your Azure tenant to support using Conditional Access policies to grant access to the Intune Microsoft Tunnel VPN gateway solution.
4
4
keywords:
5
5
author: brenduns
6
6
ms.author: brenduns
7
7
manager: dougeby
8
-
ms.date: 05/24/2021
8
+
ms.date: 01/31/2022
9
9
ms.topic: how-to
10
10
ms.service: microsoft-intune
11
11
ms.subservice: protect
@@ -25,11 +25,11 @@ ms.custom: intune-azure
25
25
ms.collection: M365-identity-device-management
26
26
---
27
27
28
-
# Use Conditional Access with the Microsoft Tunnel in Intune
28
+
# Use Conditional Access with Microsoft Tunnel in Intune
29
29
30
30
If your Microsoft Intune environment uses both Azure Active Directory (AD) and Conditional Access, you can use Conditional Access policies to gate device access to your Microsoft Tunnel VPN gateway.
31
31
32
-
To support integration of Conditional Access and the Microsoft Tunnel, you’ll use Azure AD PowerShell to enable your tenant to support Microsoft Tunnel. After enabling your tenant to support Microsoft Tunnel, you can then create Conditional Access policies that apply to the Microsoft Tunnel app.
32
+
To support integration of Conditional Access and Microsoft Tunnel, you’ll use Azure AD PowerShell to enable your tenant to support Microsoft Tunnel. After enabling your tenant to support Microsoft Tunnel, you can then create Conditional Access policies that apply to the Microsoft Tunnel app.
0 commit comments