You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: memdocs/intune/enrollment/device-enrollment.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -39,7 +39,7 @@ Intune lets you manage your workforce's devices and apps and how they access you
39
39
40
40
As you can see in the following tables, there are several methods to enroll your workforce's devices. Each method depends on the device's ownership (personal or corporate), device type (iOS, Windows, Android), and management requirements (resets, affinity, locking).
41
41
42
-
By default, devices for all platforms are allowed to enroll in Intune. However, you can [restrict devices by platform](enrollment-restrictions-set.md#create-a-device-type-restriction).
42
+
By default, devices for all platforms are allowed to enroll in Intune. However, you can [restrict devices by platform](enrollment-restrictions-set.md#create-a-device-platform-restriction) in Intune.
@@ -58,78 +58,56 @@ The specific enrollment restrictions that you can create include:
58
58
- Maximum version.
59
59
- Restrict [personally owned devices](device-enrollment.md#bring-your-own-device) (iOS, Android device administrator, Android Enterprise work profile, macOS, and Windows).
60
60
61
-
## Default restrictions
62
61
63
-
Default restrictions are automatically provided for both device type and device limit enrollment restrictions. You can change the options for the defaults. Default restrictions apply to all user and userless enrollments. You can override these defaults by creating new restrictions with higher priorities.
62
+
## Default restrictions
64
63
65
-
## Create a device type restriction
66
-
67
-
1. Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) > **Devices** > **Enroll Devices** > **Enrollment restrictions** > **Create restriction** > **Device type restriction**.
68
-
2. On the **Basics** page, give the restriction a **Name** and optional **Description**.
69
-
3. Choose **Next** to go to the **Platform settings** page.
70
-
4. Under **Platform**, choose **Allow** for the platforms that you want this restriction to allow.
71
-
:::image type="content" source="./media/enrollment-restrictions-set/choose-platform-settings.png" alt-text="Device type restriction platform settings blade":::
72
-
5. Under **Versions**, choose the minimum and maximum versions that you want the allowable platforms to support. For iOS and Android, version restrictions only apply to devices enrolled with the Company Portal.
73
-
Supported version formats include:
74
-
- Android device administrator and Android Enterprise work profile support major.minor.rev.build.
75
-
- iOS/iPadOS supports major.minor.rev. Operating system versions don't apply to Apple devices that enroll with the Device Enrollment Program, Apple School Manager, or the Apple Configurator app.
76
-
- Windows supports major.minor.build.rev for Windows 10 and Windows 11 only.
77
-
78
-
> [!IMPORTANT]
79
-
> Android Enterprise work profile and Android device administrator platforms have the following behavior:
80
-
> - If both platforms are allowed for the same group, then users will be enrolled with a work profile if their device supports it, otherwise they will enroll as device administrator.
81
-
> - If both platforms are allowed for the group and refined for specific and non-overlapping versions, then users will receive the enrollment flow defined for their OS version.
82
-
> - If both platforms are allowed, but blocked for the same versions, then users on devices with the blocked versions will be taken down the Android device administrator enrollment flow and then get blocked from enrollment and prompted to sign out.
83
-
>
84
-
> Worth noting that neither work profile or device administrator enrollment will work unless the appropriate prequisites have been completed in Android Enrollment.
85
-
86
-
6. Under **Personally-owned**, choose **Allow** for the platforms that you want to permit as personally owned devices.
87
-
7. Under **Device manufacturer**, enter a comma-separated list of the manufacturers that you want to block.
88
-
8. Choose **Next** to go to the **Scope tags** page.
89
-
9. On the **Scope tags** page, optionally add the scope tags you want to apply to this restriction. For more information about scope tags, see [Use role-based access control and scope tags for distributed IT](../fundamentals/scope-tags.md). When using scope tags with enrollment restrictions, users can only re-order policies for which they have scope. Also, they can only reorder for the policy positions for which they have scope. Users see the true policy priority number on each policy. A scoped user can tell the relative priority of their policies even if they can't see all the other policies.
90
-
10. Choose **Next** to go to the **Assignments** page.
91
-
11. Choose **Select groups to include** and then use the search box to find groups that you want to include in this restriction. The restriction applies only to groups to which it's assigned. If you don't assign a restriction to at least one group, it won't have any effect. Then choose **Select**.
92
-

93
-
12. Select **Next** to go to the **Review + create** page.
94
-
13. Select **Create** to create the restriction.
95
-
14. The new restriction is created with a priority just above the default. You can [change the priority](#change-enrollment-restriction-priority).
96
-
97
-
98
-
## Create a device platform restriction
64
+
Default policies are available in Intune for both device type and device limit enrollment restrictions. The defaults apply to all user and userless enrollments. You can edit and change the defaults. You can also override the default restrictions by creating new restriction policies with higher priority.
99
65
66
+
67
+
## Create a device platform restriction
100
68
101
69
1. Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
102
-
2. In the side menu, go to **Devices** and scroll down to **Policy**. Select **Enrollment device platform restrictions**. You can also access this policy by going to **Devices** > **Enroll devices** > **Enrollment device platform restrictions**.
103
-
104
-
3. At the top of the page, select the tab that corresponds with the platform you're configuring. Your options:
70
+
2. Go to **Devices** > **Enroll devices** > **Enrollment device platform restrictions**.
71
+
3. Select the tab along the top of the page that corresponds with the platform you're configuring. Your options:
105
72
106
73
***Android restrictions**
107
74
***Windows restrictions**
108
75
***MacOS restrictions**
109
76
***iOS restrictions**
110
77
111
-
Then select **Create restriction**.
112
-
113
-
> [!div class="mx-imgBorder"]
114
-
> 
115
-
4. On the **Basics** page, give the restriction a **Name** and optional **Description**. Then select **Next**.
116
-
5. On the **Platform settings** page, configure the restrictions for your selected platform. Your options:
78
+
4. Select **Create restriction**.
79
+
5. On the **Basics** page, give the restriction a name and optional description.
80
+
6. Select **Next**.
81
+
7. On the **Platform settings** page, configure the restrictions for your selected platform. Your options:
117
82
-**Platform** (Android only): Select **Allow** to permit devices running the Android or Android Enterprise platforms to enroll in Intune.
118
-
-**MDM** (Windows, macOS, and iOS/iPadOS only): Select **Allow** to permit devices running the selected platform to enroll in Intune.
119
-
-**Allow min/max range** (Android, Windows, iOS/iPadOS only): Enter the minimum and maximum OS versions allowed to enroll. For iOS and Android, version restrictions only apply to devices enrolled with the Company Portal. Supported version formats include:
120
-
- Android device administrator and Android Enterprise work profile support major.minor.rev.build.
121
-
- iOS/iPadOS supports major.minor.rev. Operating system versions don't apply to Apple devices that enroll with the Device Enrollment Program, Apple School Manager, or the Apple Configurator app.
122
-
- Windows supports major.minor.build.rev for Windows 10 and Windows 11 only.
83
+
-**MDM** (Windows, macOS, and iOS/iPadOS): Select **Allow** to permit devices running the selected platform to enroll in Intune.
84
+
-**Allow min/max range** (Android, Windows, iOS/iPadOS only): Enter the minimum and maximum OS versions allowed to enroll. For iOS and Android, version restrictions only apply to devices enrolled through the Company Portal. Supported version formats include:
85
+
- Android device administrator and Android Enterprise work profile support major.minor.rev.build.
86
+
- iOS/iPadOS supports major.minor.rev. Operating system versions don't apply to Apple devices that enroll with the Device Enrollment Program, Apple School Manager, or the Apple Configurator app.
87
+
- Windows supports major.minor.build.rev for Windows 10 and Windows 11 only.
123
88
-**Personally-owned**: Select **Allow** to permit devices to enroll and operate as personal devices.
124
89
-**Device manufacturer**: Enter a comma-separated list of the manufacturers that you want to block.
125
90
126
-
6. On the **Scope tags** page, optionally add the scope tags you want to apply to this restriction. For more information about scope tags, see [Use role-based access control and scope tags for distributed IT](../fundamentals/scope-tags.md). When using scope tags with enrollment restrictions, users can only re-order policies for which they have scope. Also, they can only reorder for the policy positions for which they have scope. Users see the true policy priority number on each policy. A scoped user can tell the relative priority of their policies even if they can't see all the other policies. When you're done, select **Next**.
127
-
7. On the **Assignments** page, select **Add groups** and then use the search box to find groups that you want to include in this restriction. Choose **Select** to add the groups. To assign the restriction to all device users instead, select **Add all users**. If you don't assign a restriction to at least one group, the restriction won't take effect.
128
-
8. Optionally, after you assign groups, select **Edit filter** to restrict the policy assignment further. When you finish adding filters, choose **Select** > **Next**. Filters are available for macOS, iOS, and Windows policies. For more information, see [Using filters with enrollment restriction and ESP policies](enrollment-restrictions-set.md#using-filters-with-enrollment-restriction-and-esp-policies) (in this article).
129
-
9. On the **Review + create** page, select **Create** to create the restriction.
91
+
8. Select **Next**.
92
+
9. Optionally, add scope tags to the restriction. For more information about scope tags, see [Use role-based access control and scope tags for distributed IT](../fundamentals/scope-tags.md).
93
+
94
+
> [!NOTE]
95
+
> When using scope tags with enrollment restrictions, users can only re-order policies for which they have scope. Also, they can only reorder for the policy positions for which they have scope. Users see the true policy priority number on each policy. A scoped user can tell the relative priority of their policies even if they can't see all the other policies.
96
+
10. Select **Next**.
97
+
11. On the **Assignments** page, select **Add groups** and then use the search box to find and select groups. To assign the restriction to all device users, select **Add all users**. If you don't assign a restriction to at least one group, the restriction won't take effect.
98
+
12. Optionally, after you assign groups, select **Edit filter** to restrict the policy assignment further with filters. Filters are available for macOS, iOS, and Windows policies. For more information, see [Using filters with enrollment restriction and ESP policies](enrollment-restrictions-set.md#using-filters-with-enrollment-restriction-and-esp-policies) (in this article).
99
+
13. Select **Next**.
100
+
14. On the **Review + create** page, select **Create** to save and create your restriction.
130
101
131
102
You can view the new restriction and access its properties from the **Device type restrictions** table. Select and drag the restriction to reposition it in the table and change its priority.
132
103
104
+
### Applying Android restrictions
105
+
Neither work profile nor device administrator enrollment will work unless the appropriate prerequisites for Android enrollment are complete. The Android Enterprise work profile and Android device administrator platforms have the following behavior when restrictions are applied:
106
+
107
+
* If you allow both OS platforms for the same group, users on supported devices will enroll with a work profile. Devices that aren't supported will enroll under Android device administrator, without a profile.
108
+
* If you allow both OS platforms for the same group and refine it for specific and non-overlapping versions, devices will go through the enrollment throw that's selected for their version.
109
+
* If you allow both platforms, but block the same versions, devices running blocked versions will go through the Android device administrator enrollment flow, get blocked from enrollment, and be prompted to sign out.
110
+
133
111
134
112
## Create a device limit restriction
135
113
@@ -166,7 +144,7 @@ During BYOD enrollments, users see a notification that tells them when they've m
166
144
167
145
## Change enrollment restrictions
168
146
169
-
You can change the settings for an enrollment restriction by following the steps below. These restrictions don't effect devices that have already been enrolled.
147
+
You can change the settings for an enrollment restriction by following the steps below. These restrictions don't affect devices that have already been enrolled.
170
148
171
149
1. Sign in to the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) > **Devices** > **Enrollment restrictions** > choose the restriction that you want to change > **Properties**.
172
150
2. Choose **Edit** next to the settings that you want to change.
Copy file name to clipboardExpand all lines: memdocs/intune/fundamentals/deployment-guide-intune-setup.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -310,7 +310,7 @@ This section includes an overview of the steps. Use these steps as guidance, and
310
310
311
311
6. By default, all device platforms can enroll in Intune. If you want to prevent specific platforms, then create a restriction.
312
312
313
-
For more information, see [Create a device type restriction](../enrollment/enrollment-restrictions-set.md#create-a-device-type-restriction).
313
+
For more information, see [Create a device platform restriction](../enrollment/enrollment-restrictions-set.md#create-a-device-platform-restriction).
314
314
315
315
7. Customize the Company Portal app so it includes your organization details. Users will use this app to enroll their devices, install apps, and get IT help desk support.
Copy file name to clipboardExpand all lines: memdocs/intune/fundamentals/manage-os-versions.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -49,7 +49,7 @@ Organizations are using device type restrictions to control access to organizati
49
49
1. Use minimum operating system version to keep end users on current and supported platforms in your organization.
50
50
2. Leave maximum operating system unspecified (no limit) or set it to the last validated version in your organization to allow time for internal testing of new operating system releases.
51
51
52
-
For details, see [Set device type restrictions](../enrollment/enrollment-restrictions-set.md#create-a-device-type-restriction).
52
+
For details, see [Create a device platform restriction](../enrollment/enrollment-restrictions-set.md#create-a-device-platform-restriction).
53
53
54
54
## Operating system version reporting and compliance with Intune MDM device compliance policies
55
55
@@ -71,7 +71,7 @@ Organizations are using device compliance policies for the same scenarios as enr
71
71
For details, see [Get started with device compliance](../protect/device-compliance-get-started.md).
72
72
73
73
## Operating system version controls using Intune app protection policies
74
-
Intune app protection policies and mobile application management (MAM) access settings let you to specify the minimum operating system version at the app layer. This lets you inform and encourage, or require, your end users to update their operating system to a specified minimum version.
74
+
Intune app protection policies and mobile application management (MAM) access settings let you specify the minimum operating system version at the app layer. This lets you inform and encourage, or require, your end users to update their operating system to a specified minimum version.
75
75
76
76
You have two different options:
77
77
-**Warn** - Warn informs the end user that they should upgrade if they open an app with an application protection policy or MAM access settings on a device with an operating system version below the specified version. Access is allowed for the app and organizational data.
@@ -100,6 +100,6 @@ You can use the Intune capabilities described in this article to help you move y
100
100
101
101
Use the following resources to manage operating system versions in your organization:
102
102
103
-
-[Set device type restrictions](../enrollment/enrollment-restrictions-set.md#create-a-device-type-restriction)
103
+
-[Set device type restrictions](../enrollment/enrollment-restrictions-set.md)
104
104
-[Get started with device compliance](../protect/device-compliance-get-started.md)
105
105
-[How to create and assign app protection policies](../apps/app-protection-policies.md)
0 commit comments