You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -28,6 +24,14 @@ This article describes known issues that can often be resolved by configuration
28
24
29
25
## Known issues
30
26
27
+
### Autopilot deployment report shows "failure" status on a successful deployment
28
+
29
+
The Autopilot deployment report (preview) will show a failed status for any device that experiences an initial deployment failure. For subsequent deployment attempts, using the **Try again** or **Continue to desktop** options, it won't update the deployment state in the report. If the user resets the device, it will show as a new deployment row in the report with the previous attempt remaining as failed.
30
+
31
+
### Autopilot deployment report doesn't show deployed device
32
+
33
+
Autopilot deployments that take longer than one hour may display an incomplete deployment status in the deployment report. If the device successfully enrolls but doesn't complete provisioning after more than one hour, the device status may not be updated in the report.
34
+
31
35
### Autopilot profile not being applied when assigned
32
36
33
37
In Windows 10 April and some May update releases, there is an issue where the Autopilot profile may fail to apply to the device and the hardware hash may not be harvested. As a result, any settings made in the profile may not be configured for the user such as device renaming. To resolve this issue, the May (KB5015020) cumulative update needs to be applied to the device.
@@ -62,9 +66,11 @@ When you attempt an Autopilot reset, you see the following message: _Autopilot r
62
66
63
67
When a device is registered in Autopilot and no profile is assigned, it will take the default Autopilot profile. This behavior is by design. It makes sure that all devices that you register with Autopilot go through the Autopilot experience. If you don't want the device to go through an Autopilot deployment, remove the Autopilot registration.
64
68
65
-
### White screen during HAADJ deployment
69
+
### White screen during hybrid Azure AD joined deployment
70
+
71
+
There's a UI bug on Autopilot hybrid Azure AD joined deployments where the Enrollment Status page is displayed as a white screen. This issue is limited to the UI and shouldn't affect the deployment process.
66
72
67
-
There's a UI bug on Autopilot HAADJ deployments where the Enrollment Status page is displayed as a white screen. This issue is limited to the UI and shouldn't affect the deployment process.
73
+
This issue was resolved in September 2022.
68
74
69
75
### Virtual machine failing at "Preparing your device for mobile management"
Copy file name to clipboardExpand all lines: memdocs/intune/apps/app-management.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -74,7 +74,7 @@ Intune offers a range of capabilities to help you get the apps you need on the d
74
74
| Apps from a store | Yes | Yes | No | Yes |
75
75
| Update apps | Yes | Yes | No | Yes |
76
76
77
-
<sup>1</sup> Consider using [Windows Information Protection](../protect/windows-information-protection-configure.md) to protect apps on devices that run Windows 10/11.<br>
77
+
<sup>1</sup> Consider using [Microsoft Purview Information Protection](/microsoft-365/compliance/information-protection) and [Microsoft Purview Data Loss Prevention](/microsoft-365/compliance/dlp-learn-about-dlp). Microsoft Purview simplifies the configuration set-up and provides an advanced set of capabilities. <br>
78
78
<sup>2</sup> Applies to devices managed by Intune only.<br>
79
79
<sup>3</sup> Intune supports available apps from Managed Google Play store on Android Enterprise devices.<br>
80
80
<sup>4</sup> Intune does not provide installing a shortcut to an app as a web link on standard Android Enterprise devices. However, Web link support is provided for [multi-app dedicated Android Enterprise devices](../configuration/device-restrictions-android-for-work.md#device-experience).<br>
Copy file name to clipboardExpand all lines: memdocs/intune/fundamentals/whats-new.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -216,7 +216,7 @@ The **All devices** option is now available for [compliance policy](../protect/c
216
216
When you include the *All devices* group you can then exclude individual groups of devices to further refine the assignment scope.
217
217
218
218
#### Trend Micro – New mobile threat defense partner<!-- 11017779 -->
219
-
You can now use [Trend Micro Mobile Security](../protect/trend-micro-mobile-threat-defense-connector.md) as an integrated mobile threat defense (MTD) partner with Intune. By configuring the Trend MTD connector in Intune, you can control mobile device access to corporate resources using conditional access that's based on risk assessment.
219
+
You can now use [Trend Micro Mobile Security as a Service](../protect/trend-micro-mobile-threat-defense-connector.md) as an integrated mobile threat defense (MTD) partner with Intune. By configuring the Trend MTD connector in Intune, you can control mobile device access to corporate resources using conditional access that's based on risk assessment.
220
220
221
221
For more information, see:
222
222
-[Mobile threat defense integration with Intune](../protect/mobile-threat-defense.md)
Copy file name to clipboardExpand all lines: memdocs/intune/protect/mtd-apps-ios-app-configuration-policy-add-assign.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -157,9 +157,9 @@ Use the same Azure AD account previously configured in the [Symantec Endpoint Pr
157
157
158
158
Create the iOS app configuration policy as described in the [using iOS app configuration policy](../apps/app-configuration-policies-use-ios.md) article. For more information, see [Sophos Intercept X for Mobile iOS - Available managed settings](https://community.sophos.com/kb/133963) in the Sophos knowledge base.
159
159
160
-
### Trend Micro Mobile Security app configuration policy
160
+
### Trend Micro Mobile Security as a Service app configuration policy
161
161
162
-
See the instructions for [using Microsoft Intune app configuration policies for iOS](../apps/app-configuration-policies-use-ios.md) to add the Trend Micro Mobile Security app configuration policy.
162
+
See the instructions for [using Microsoft Intune app configuration policies for iOS](../apps/app-configuration-policies-use-ios.md) to add the Trend Micro Mobile Security as a Service app configuration policy.
Copy file name to clipboardExpand all lines: memdocs/intune/protect/trend-micro-mobile-threat-defense-connector.md
+16-11Lines changed: 16 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
# required metadata
3
3
4
-
title: Trend Micro Mobile connector with Intune
4
+
title: Trend Micro Mobile Security as a Service connector with Intune
5
5
titleSuffix: Intune on Azure
6
6
description: Set up the Trend Micro Mobile Threat Defense connector with Intune.
7
7
keywords:
@@ -29,11 +29,16 @@ search.appverid: MET150
29
29
ms.collection: M365-identity-device-management
30
30
---
31
31
32
-
# Use Trend Micro Mobile Security with Intune
32
+
# Use Trend Micro Mobile Security as a Service with Microsoft Intune
33
33
34
-
Control mobile device access to corporate resources using Conditional Access based on risk assessment conducted by Trend Micro Mobile Security, a mobile threat defense (MTD) solution that integrates with Microsoft Intune. Risk is assessed based on telemetry collected from devices running the Trend Micro Mobile Agent app.
34
+
Control mobile device access to corporate resources using Conditional Access based on risk assessment conducted by Trend Micro Mobile Security as a Service, a mobile threat defense (MTD) solution that integrates with Microsoft Intune. Risk is assessed based on telemetry collected from devices protected by the Trend Micro Mobile Security as a Service, including:
35
35
36
-
You can configure Conditional Access policies based on a Trend Micro risk assessment, enabled through Intune device compliance policies for enrolled devices. You can set up your policies to allow or block noncompliant devices from accessing corporate resources based on detected threats.
36
+
- Malicious apps installed
37
+
- Malicious network behavior and profiles
38
+
- Operating system vulnerabilities
39
+
- Device misconfiguration
40
+
41
+
You can configure Conditional Access policies based on Trend Micro Mobile Security as a Service’s risk assessment, enabled through Intune device compliance policies for enrolled devices. You can set up your policies to allow or block noncompliant devices from accessing corporate resources based on detected threats.
37
42
38
43
For more information about how to integrate Trend Micro with Microsoft Intune, see [Integration with Microsoft Endpoint Manager (Intune)](http://docs.trendmicro.com/en-us/enterprise/trend-micro-vision-one/mobile-security/getting-started-with_003/integration-with-int.aspx) in the [Trend Micro Mobile Security documentation](https://docs.trendmicro.com/en-us/enterprise/trend-micro-vision-one/mobile-security.aspx).
39
44
@@ -53,11 +58,11 @@ For more information about how to integrate Trend Micro with Microsoft Intune, s
53
58
54
59
## How do Intune and the Trend Micro MTD connector help protect your company resources?
55
60
56
-
The Trend Micro Mobile Agent app for Android and iOS/iPadOS captures file system, network stack, device, and application telemetry where available, then sends the telemetry data to the *Mobile Security* cloud service to assess the device's risk for mobile threats.
61
+
The Trend Micro Mobile Security as a Service mobile agent app for Android and iOS/iPadOS captures file system, network stack, device, and application telemetry where available, then sends the telemetry data to Trend Micro Mobile Security as a Service to assess the device's risk for mobile threats.
57
62
58
-
-**Support for enrolled devices** - Intune device compliance policy includes a rule for MTD, which can use risk assessment information from Trend Micro. When the MTD rule is enabled, Intune evaluates device compliance with the policy that you enabled. If the device is found noncompliant, users are blocked access to corporate resources, such as Exchange Online and SharePoint Online. Users also receive guidance from the Trend Micro Mobile Agent app installed on their devices to resolve the issue and regain access to corporate resources. To support using Trend Micro with enrolled devices:
63
+
-**Support for enrolled devices** - Intune device compliance policy includes a rule for MTD, which can use risk assessment information from Trend Micro. When the MTD rule is enabled, Intune evaluates device compliance with the policy that you enabled. If the device is found noncompliant, users are blocked access to corporate resources, such as Exchange Online and SharePoint Online. Users also receive guidance from the Trend Micro Mobile Security as a Service mobile agent app installed on their devices to resolve the issue and regain access to corporate resources. To support using Trend Micro with enrolled devices:
59
64
60
-
-[Add MTD apps to devices](../protect/mtd-apps-ios-app-configuration-policy-add-assign.md)
65
+
-[Add MTD apps to devices](../protect/mtd-apps-ios-app-configuration-policy-add-assign.md) (This is done automatically when setting up Trend Micro Mobile Security as a Service integration)
61
66
-[Create a device compliance policy that supports MTD](../protect/mtd-device-compliance-policy-create.md)
62
67
-[Enable the MTD connector in Intune](../protect/mtd-connector-enable.md)
63
68
@@ -107,7 +112,7 @@ Detect threats like **Man-in-the-middle** in network and prevent synchronization
107
112
108
113
## Next steps
109
114
110
-
-[Integrate Trend Micro with Intune](../protect/trend-micro-mtd-connector-integration.md)
111
-
-[Set up Trend Micro Mobile Agent app](../protect/mtd-apps-ios-app-configuration-policy-add-assign.md)
0 commit comments