Skip to content

Commit 4c58996

Browse files
authored
Merge pull request #7056 from Erikre/erikre-rel2203-13869997a-WN
erikre-rel2203-13869997a-WN
2 parents f455dac + 95c926f commit 4c58996

1 file changed

Lines changed: 227 additions & 1 deletion

File tree

memdocs/intune/fundamentals/whats-new.md

Lines changed: 227 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: Erikre
88
ms.author: erikre
99
manager: dougeby
10-
ms.date: 02/24/2022
10+
ms.date: 03/23/2022
1111
ms.topic: conceptual
1212
ms.service: microsoft-intune
1313
ms.subservice: fundamentals
@@ -60,6 +60,232 @@ You can use RSS to be notified when this page is updated. For more information,
6060
### Scripts
6161
-->
6262

63+
## Week of March 21, 2022 (Service release 2203)
64+
65+
### App management
66+
67+
#### iOS/iPadOS notifications will require March Company Portal update<!-- 9819536 -->
68+
If you are using a functionality that could generate iOS/iPadOS Company Portal push notifications, you will want to ensure your users update the iOS/iPadOS Company Portal in March or April 2022. There is no additional change in functionality. We will be making service side updates to iOS/iPadOS notifications expected in Intune's May (2205) service release. The Company Portal update will be released prior to the service change, so most users will likely have updated the app and will not be impacted. However, you may want to notify users of this change to ensure all users continue to receive push notifications sent by your organization. For related information, see [Update the Company Portal app](../user-help/install-a-new-version-of-the-company-portal-app.md).
69+
70+
#### Feedback settings for Company Portal and Microsoft Intune apps<!-- 10012370 -->
71+
Feedback settings are provided to address M365 enterprise feedback policies for the currently logged in user via the [Microsoft 365 Apps admin center](https://config.office.com/). The settings are used to determine whether feedback can be enabled or must be disabled for a user. This feature is available for Intune Company Portal and Microsoft Intune apps. For more information, see [Configure feedback settings for Company Portal and Microsoft Intune apps](../apps/company-portal-app.md#configure-feedback-settings-for-company-portal-and-microsoft-intune-apps).
72+
73+
#### Deploy macOS LOB apps by uploading PKG-type installer files (Public preview)<!-- 13155147 -->
74+
You can now upload and deploy PKG-type installer files as macOS line-of-business apps. You can add a macOS LOB app from [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) by selecting **Apps** > **macOS** > **Add** > **Line-of-business app**. For more information about macOS LOB apps, see [How to add macOS line-of-business apps to Microsoft Intune](../apps/lob-apps-macos.md).
75+
76+
### Device management
77+
78+
#### See the IPv4 address and Wi-Fi subnet ID on Android Enterprise devices<!-- 12396463 -->
79+
Customers can view the IPv4 address and Wi-Fi subnet ID reported for Android Enterprise corporate-owned fully managed, dedicated, and work profile devices.
80+
81+
#### Android (AOSP) users can view all devices in Intune app<!-- 10454654 -->
82+
AOSP device users can now view a list of their managed devices and device properties in the Microsoft Intune app. This feature is available on devices enrolled in Intune as user-associated (Android) AOSP devices.
83+
84+
#### Update eSim cellular data plan in bulk for iOS/iPadOS (public preview)<!-- 13139261a -->
85+
You can now perform a Bulk device action (**Devices** > **Bulk device action** > **Update cellular data**) to remotely activate or update the cellular data plan on iOS/iPadOS devices that support it. This feature is currently in public preview. For related information, see [Use bulk device actions](..\remote-actions\bulk-device-actions.md).
86+
87+
#### Preserve cellular data plan when bulk wiping iOS/iPadOS devices<!-- 13139261b -->
88+
When you perform a Bulk device action (**Devices** > **Bulk device action** > **Wipe**) to remotely wipe iOS/iPadOS devices from Intune, any cellular data plan on the device will be preserved. However, if you would like to have the devices' data plan removed, then you have the option to select a checkbox and remove the cellular data plan when wiping the devices. For related information, see [Use bulk device actions](..\remote-actions\bulk-device-actions.md).
89+
90+
#### Freeze the install of system updates for Android Enterprise corporate-owned devices<!-- 7912819 -->
91+
For Android Enterprise corporate-owned devices that run version 9.0 and later, you can configure freeze periods during which no system or security updates can install.
92+
93+
To configure a freeze, use Intune device restriction profiles to set one or more blocks that can recur each year. Each block can be for up to 90 days, but you must have a minimum of 60 days between freeze periods, when system updates are allowed to install.
94+
95+
For information about configuring a freeze period, see **Freeze periods for system updates** in [Android Enterprise device settings to allow or restrict features using Intune](../configuration/device-restrictions-android-for-work.md).
96+
97+
For information about Android requirements for implementing a freeze, see [FreezePeriod](https://developers.google.com/android/management/reference/rest/v1/enterprises.policies#freezeperiod) in the Google developer documentation.
98+
99+
### Device security
100+
101+
#### Tenant attach: Antivirus profile<!-- 13425641 -->
102+
The Endpoint Security Microsoft Defender Anti-virus profile is now generally available. For more information, see [Tenant attach: Create and deploy Antivirus policies from the admin center](../../configmgr/tenant-attach/endpoint-security-get-started.md).
103+
104+
### Monitor and troubleshoot
105+
106+
#### AppxPackaging event viewer is part of collect diagnostics<!-- 12809781 -->
107+
Intune's remote action to [Collect diagnostics](../remote-actions/collect-diagnostics.md) will collect additional details from Windows devices.  (**Devices** > **Windows** > *select a Windows device* > **Collect diagnostics**)
108+
109+
The new details include the **Microsoft-Windows-AppxPackaging/Operational** Event Viewer and the following office log files to assist in troubleshooting office installation issues:
110+
111+
`%windir%\temp\%computername%*.log`</br>
112+
`%windir%\temp\officeclicktorun*.log`
113+
114+
### Device enrollment
115+
116+
#### Utilize bootstrap tokens on enrolled macOS devices (public preview)<!-- 9539461 -->
117+
Intune now supports the use of bootstrap tokens on enrolled devices running macOS, version 10.15 or later. Bootstrap tokens allow for non-admin users to have increased MDM permissions, and perform specific software functions on behalf of the IT admin. Tokens are supported on:
118+
119+
- Supervised devices (in Intune, that's all user-approved enrollments)
120+
- Devices enrolled in Intune via Apple automated device enrollment
121+
122+
Bootstrap tokens will begin to function no sooner than March 26, 2022, and it could take longer before they begin to function in all tenants.
123+
124+
For more information about how bootstrap tokens work with Intune, see [Set up enrollment for macOS devices](../enrollment/macos-enroll.md).
125+
126+
### Enroll macOS virtual machines running Apple silicon<!-- 13242738 -->
127+
Use the Company Portal app for macOS to enroll virtual machines running on Apple silicon. Intune supports using macOS virtual machines for testing purposes only. For more information about enrolling virtual machines in Intune, see [Set up enrollment for macOS devices](../enrollment/macos-enroll.md).
128+
129+
### Device configuration
130+
131+
#### New reporting experience for device configuration profiles<!-- 8466004 -->
132+
There is now a new reporting experience for device configuration profiles. This reporting experience excludes Windows administrative template (ADMX), Android Enterprise devices with OEMConfig, and Device Firmware Configuration Interface (DFCI) profile types.
133+
134+
We are continuing to update Intune's report experience to enhance consistency, accuracy, organization, and data representation, which gives an overall "facelift" of Intune's per policy reporting. The new experience updates the per policy overview page to shift away from donut charts to a sleeker overview chart that quickly updates as devices/users check-in.
135+
136+
There are three reports available from the per policy view:
137+
- **Device and user check-in status** - This report combines information that was previously split into separate device status and user status reports. This report shows the list of device and user check-ins for the device configuration profile, with the check-in status and last check-in time. When you open the report, the aggregate chart will remain at the top of the page, and the data will be consistent with the list data. Use the filter column to view assignment filter options.
138+
- **Device assignment status** - This report surfaces data on the latest status for assigned devices from the device configuration profile. Intune reporting will include pending state information.
139+
- **Per setting status** - This report surfaces the summary of device and user check-ins that are in **Success**, **Conflict**, **Error** states at the granular setting level within the device configuration profile. This report leverages the same consistency and performance updates as well as navigation tools we’ve made available to other reports.
140+
141+
More drilldowns are available and additional assignment filters are supported for each report. For more information about each of these reports, see [Intune reports](../fundamentals/reports.md).
142+
143+
#### Google Chrome settings are in Settings Catalog and Administrative Templates<!-- 6198569 -->
144+
Google Chrome settings are included in the Settings Catalog and Administrative Templates (ADMX). Previously, to configure Google Chrome settings on Windows devices, you created a custom OMA-URI device configuration policy.
145+
146+
For more information on these policy types, see:
147+
- [Use the settings catalog to configure settings on Windows and macOS devices](../configuration/settings-catalog.md)
148+
- [Use ADMX templates to configure group policy settings in Microsoft Intune](../configuration/administrative-templates-windows.md)
149+
150+
Applies to:
151+
- Windows 10/11
152+
153+
#### Endpoint security profiles support filters; See the filter status on a device configuration profile report<!-- 11889620 -->
154+
There are some new features when using filters:
155+
- When you create a device configuration profile for Windows devices, a per-policy report shows reporting information in the **Device and user check-in status** (**Devices** > **Configuration profiles** > *Select an existing policy*).
156+
157+
When you select **View report**, the report has an **Assignment Filter** column. Use this column to determine if a filter successfully applied to your policy.
158+
159+
- Endpoint Security policies support filters. So, when you assign an endpoint security policy, you can use filters to assign the policy based on rules you create.
160+
161+
- When you create a new endpoint security policy, it automatically uses the [new device configuration profile reporting](#new-reporting-experience-for-device-configuration-profiles). When you look at the per-policy report, it also has an **Assignment Filter** column (**Devices** > **Configuration profiles** > *Select an existing endpoint security policy* > **View report**). Use this column to determine if a filter successfully applied to your policy.
162+
163+
For more information on filters, see:
164+
- [Use filters when assigning your apps, policies, and profiles](filters.md)
165+
- [List of platforms, policies, and app types supported by filters](filters-supported-workloads.md)
166+
167+
Applies to:
168+
- All platforms
169+
170+
Does not apply to:
171+
- Administrative Templates (Windows 10/11)
172+
- Device Firmware Configuration Interface (DFCI) (Windows 10/11)
173+
- OEMConfig (Android Enterprise)
174+
175+
#### New macOS settings in the Settings Catalog<!-- 13111526 idready idstaged wnready -->
176+
The Settings Catalog has new macOS settings you can configure (**Devices** > **Configuration profiles** > **Create profile** > **macOS** for platform >**Settings catalog (preview)** for profile type):
177+
178+
**User Experience > Accessibility**:
179+
- Close View Far Point
180+
- Close View Hotkeys Enabled
181+
- Close View Near Point
182+
- Close View Scroll Wheel Toggle
183+
- Close View Smooth Images
184+
- Contrast
185+
- Flash Screen
186+
- Mouse Driver
187+
- Mouse Driver Cursor Size
188+
- Mouse Driver Ignore Trackpad
189+
- Mouse Driver Initial Delay
190+
- Mouse Driver Max Speed
191+
- Slow Key
192+
- Slow Key Beep On
193+
- Slow Key Delay
194+
- Stereo as Mono
195+
- Sticky Key
196+
- Sticky Key Beep On Modifier
197+
- Sticky Key Show Window
198+
- Voice Over On Off Key
199+
- White On Black
200+
201+
**Air Play**:
202+
- Allow List
203+
- Password
204+
205+
**User Experience > Desktop**:
206+
- Override Picture Path
207+
208+
**Preferences > Global Preferences**:
209+
- Auto Log Out Delay
210+
- Multiple Session Enabled
211+
212+
**Printing > Printing**:
213+
- Require Admin To Print Locally
214+
215+
**Security > Security Preferences**:
216+
- Do Not Allow Firewall UI
217+
- Do Not Allow Lock Message UI
218+
- Do Not Allow Password Reset UI
219+
220+
**Preferences > System Preferences**:
221+
- Disabled Preference Panes
222+
- Enabled Preference Panes
223+
224+
**Preferences > User Preferences**:
225+
- Disable Using Cloud Password
226+
227+
The following settings are also in Settings Catalog. Previously, they were only available in Templates:
228+
229+
**Printing > Air Print**:
230+
- IP Address
231+
- Resource Path
232+
233+
**Networking > Firewall**:
234+
- Allowed
235+
- Bundle ID
236+
- Block All Incoming
237+
- Enable Firewall
238+
- Enable Stealth Mode
239+
240+
**Login > Login Items**:
241+
- Hide
242+
243+
**Login > Login Window Behavior**:
244+
- Admin Host Info
245+
- Allow List
246+
- Deny List
247+
- Disable Console Access
248+
- Disable Screen Lock Immediate
249+
- Hide Admin Users
250+
- Hide Local Users
251+
- Include Network User
252+
- Log Out Disabled While Logged In
253+
- Login Window Text
254+
- Power Off Disabled While Logged In
255+
- Restart Disabled
256+
- Restart Disabled While Logged In
257+
- Show Full Name
258+
- Show Other Users Managed
259+
- Shut Down Disabled
260+
- Shut Down Disabled While Logged In
261+
- Sleep Disabled
262+
263+
**System Policy > System Policy Control**:
264+
- Allow Identified Developers
265+
- Enable Assessment
266+
267+
**System Policy** > **System Policy Managed**:
268+
- Disable Override
269+
270+
There isn't any conflict resolution between policies created using the Settings catalog and policies created using Templates. When creating new policies in the Settings Catalog, be sure there are no conflicting settings with your current policies.
271+
272+
For more information about configuring Settings catalog profiles in Intune, see [Create a policy using settings catalog in Microsoft Intune](../configuration/settings-catalog.md).
273+
274+
Applies to:
275+
- macOS
276+
277+
### Role-based access control
278+
279+
#### Android (AOSP) will support scope tags and RBAC settings<!-- 8503981 -->
280+
When you create a policy for Android (AOSP), you can use role-based access control (RBAC) and scope tags.
281+
282+
For more information on these features, see:
283+
- [Role-based access control (RBAC) with Microsoft Intune](role-based-access-control.md)
284+
- [Use RBAC and scope tags for distributed IT](scope-tags.md)
285+
286+
Applies to:
287+
- Android Open Source Project (AOSP)
288+
63289
## Week of March 14, 2022
64290

65291
### App management

0 commit comments

Comments
 (0)