Skip to content

Commit 33d1ea2

Browse files
author
Angela Fleischmann
authored
Merge pull request #7910 from MicrosoftDocs/main
Publish 06/30/2022 3:30 PM PT
2 parents 2ffd7b4 + 6bc0f9a commit 33d1ea2

3 files changed

Lines changed: 52 additions & 5 deletions

File tree

memdocs/intune/fundamentals/whats-new.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -510,17 +510,18 @@ For information about these features, see:
510510
Applies to:
511511
- Android Open Source Project (AOSP)
512512

513-
#### User configuration support for Windows 11 multi-session VMs is in public preview. <!-- 7231329 -->
513+
#### User configuration support for Windows 11 multi-session VMs is in public preview<!-- 7231329 -->
514514

515515
You'll be able to:
516-
Configure user scope policies using **Settings catalog** and assign to groups of users
517-
Configure user certificates and assign to users
518-
Configure PowerShell scripts to install in the user context and assign to users
516+
- Configure user scope policies using **Settings catalog** and assign to groups of users
517+
- Configure user certificates and assign to users
518+
- Configure PowerShell scripts to install in the user context and assign to users
519519

520520
Applies to:
521521
- Windows 11
522522

523-
[!Note]: User support for Windows 10 multi-session builds will be available later this year.
523+
> [!Note]
524+
> User support for Windows 10 multi-session builds will be available later this year.
524525
525526
For more information, go to
526527
[Using Azure Virtual Desktop multi-session with Microsoft Intune](../fundamentals/azure-virtual-desktop-multi-session.md)

memdocs/intune/includes/intune-notices.md

Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,37 @@ ms.custom: include file
1111

1212
These notices provide important information that can help you prepare for future Intune changes and features.
1313

14+
### Plan for Change: New APP biometrics settings and authorization requirements for Android devices<!--9740832-->
15+
16+
Currently, our biometric settings do not distinguish between [Class 2 and Class 3 Biometrics](https://source.android.com/security/biometric). Expected with Intune’s July (2207) service release, we are modifying fingerprint and biometric settings for Intune app protection policies (APP) that apply to Android devices to accommodate [Class 3 Biometrics](https://developer.android.com/reference/android/hardware/biometrics/BiometricManager.Authenticators#BIOMETRIC_STRONG).
17+
18+
When you create or modify an app protection policy, you will see the following changes on the [Access requirements](/mem/intune/apps/app-protection-policy-settings-android#access-requirements) page:
19+
20+
- The setting **Fingerprint instead of PIN for access** will be rolled into the existing setting **Biometrics instead of PIN for access**. This setting will apply to all biometrics (Class 2 and Class 3).
21+
- The setting **Override fingerprint with PIN after timeout** will be modified to **Override Biometrics with PIN after timeout**. This setting will apply to all biometrics (Class 2 and Class 3).
22+
- There is a new setting: **Class 3 Biometrics (Android 9.0+)** with a new sub-setting: **Override Biometrics with PIN after biometric updates**. This sub-setting applies only to Class 3 Biometrics, when selected.
23+
24+
> [!NOTE]
25+
> Support for Class 3 Biometrics depends on the device, so you may need to contact your device manufacturers to understand device-specific limitations.
26+
27+
#### How does this affect you or your users?
28+
29+
Existing policies that allow fingerprints or biometrics for authentication will be migrated with no user impact.
30+
31+
After this change, if you configure the policy to require **Class 3 Biometrics (Android 9.0+)**, the following will occur:
32+
33+
- For users with Android devices that support Class 3 Biometrics, the user will be prompted to enter their APP PIN the first time they sign in to the APP-protected app. Subsequent sign-ins will use Class 3 Biometrics for authentication. However, if a user does not configure biometrics that satisfy the Class 3 requirements, they will be prompted to enter their PIN with each subsequent sign-in.
34+
- For users with Android devices that do not support Class 3 Biometrics, the user will be prompted to enter their PIN each time they sign in to the APP-protected app.
35+
36+
If **Override Biometrics with PIN after biometric updates** is also required, users who update their stored Class 3 Biometrics will be prompted to enter their APP PIN the next time they sign in to the APP-protected app.
37+
38+
#### How can you prepare?
39+
40+
Admins should be aware of the combined settings for fingerprints and Class 2 Biometrics. If your existing policy allows for fingerprint authentication but not other biometrics, it will allow for *both* once migrated. Also, if you had previously required an APP PIN after fingerprint timeout, this timeout setting will apply to all biometrics.
41+
42+
> [!NOTE]
43+
> If you are using the Microsoft Graph API’s FingerprintBlocked and BiometricAuthenticationBlocked, plan to update your APIs to use the new combined FingerprintAndBiometricEnabled API. The current APIs will retain their values for existing policies and the new FingerprintAndBiometricEnabled API will be defaulted to Null for these policies, until the policy has been updated.
44+
1445
### Plan for change: Intune is moving to support macOS 11.6 and higher later this year<!--14766663-->
1546

1647
Apple is expected to release macOS 13 (Ventura) later this year, Microsoft Intune, the Company Portal app and the Intune mobile device management agent will be moving to support macOS 11.6 (Big Sur) and later. Since the Company Portal app for iOS and macOS are a unified app, this change will occur shortly after the release of iOS/iPadOS 16.

memdocs/intune/protect/microsoft-tunnel-upgrade.md

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -144,6 +144,21 @@ After an update releases, it rolls out to tenants over the following days. This
144144

145145
The Microsoft Tunnel version for a server isn’t available in the Intune UI at this time. Instead, run the following command on the Linux server that hosts the tunnel to identify the hash values of *agentImageDigest* and *serverImageDiegest*: `cat /etc/mstunnel/images_configured`
146146

147+
### June 30, 2022
148+
149+
Image hash values:
150+
151+
- **agentImageDigest**: sha256:b42b8e158cebb91b6a69f2bdcedffde18a5f3f12cc502509c8aa9fea80f4daaa
152+
153+
- **serverImageDigest**: sha256:aa45b73bf143f1e440329853362cb4f300d9cc865d758534a94b983c8286ca4d
154+
155+
Changes in this release:
156+
- Minor bug fixes
157+
- Advanced setting improvements in Microsoft Tunnel configurations
158+
- Logging improvements
159+
- Additions in mstclit
160+
161+
147162
### April 27, 2022
148163

149164
Image hash values:

0 commit comments

Comments
 (0)