You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
https://microsoft-ce-csi.acrolinx.cloud/api/v1/checking/scorecards/2ecce4c8-7e5e-4478-8484-af3a22050232#CORRECTNESS
Line 114: Personally-owned > Personally owned
Lines 116, 2949: personally-owned > personally owned
Line 116: corporate-owned > corporate owned
Line 1090: Corporate-owned > corporate owned
Lines 715, 715, 1156, 1187: drill-in > drill in
Line 1414: newly-enrolled > newly enrolled
Line 3139: Backup > Back up
Line 3624: have > has
Line 5003: highly-managed > highly managed
Line 6741: device, that > device that
Line 6778: log into > log in to
Copy file name to clipboardExpand all lines: memdocs/intune/fundamentals/whats-new-archive.md
+14-14Lines changed: 14 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -111,9 +111,9 @@ Applies to:
111
111
<!-- vvvvvvvvvvvvvvvvvvvvvv -->
112
112
### Device management
113
113
114
-
#### Personally-owned work profile terminology<!--8361769 -->
114
+
#### Personallyowned work profile terminology<!--8361769 -->
115
115
116
-
To avoid confusion, the term for the *work profile* Android Enterprise management scenario will be changed to "personally-owned devices with a work profile" or *personally-owned work profile* throughout the Intune documentation and user interface. This is to differentiate it from the "corporate-owned work profile" (COPE) management scenario.
116
+
To avoid confusion, the term for the *work profile* Android Enterprise management scenario will be changed to "personallyowned devices with a work profile" or *personallyowned work profile* throughout the Intune documentation and user interface. This is to differentiate it from the "corporateowned work profile" (COPE) management scenario.
117
117
118
118
#### Windows Autopilot for HoloLens 2 (preview)<!--6305220 -->
119
119
@@ -712,7 +712,7 @@ New Android devices are making use of a more diverse set of biometrics beyond fi
712
712
713
713
#### New details in the Endpoint security configuration for a device<!-- 7745029 -->
714
714
715
-
You can now view additional details for devices as part of a devices *Endpoint security configuration*. When you drill-in to view status details about policies you've deployed to devices, you’ll now find the following setting:
715
+
You can now view additional details for devices as part of a devices *Endpoint security configuration*. When you drillin to view status details about policies you've deployed to devices, you’ll now find the following setting:
716
716
717
717
- **UPN** (User Principal Name): The UPN identifies which endpoint security profile is assigned to a given user on the device. This information is useful to help differentiate between multiple users on a device and multiple entries of a profile or baseline that’s assigned to the device.
718
718
@@ -748,7 +748,7 @@ To understand what's changed between versions, see [Compare baseline versions](.
748
748
749
749
#### Use Endpoint security configuration details to identify the source of policy conflicts for devices<!-- 7567503 -->
750
750
751
-
To aid in conflict resolution, now you can drill-in through a security baseline profile to view the *Endpoint security configuration* for a selected device. From there, you can select settings that show a *Conflict* or *Error* and continue to drill-in further to view a list of details that includes the profiles and policies that are part of the conflict.
751
+
To aid in conflict resolution, now you can drillin through a security baseline profile to view the *Endpoint security configuration* for a selected device. From there, you can select settings that show a *Conflict* or *Error* and continue to drillin further to view a list of details that includes the profiles and policies that are part of the conflict.
752
752
753
753
If you then select a policy that is a source of a conflict, Intune opens that policies Overview pane where you can review or modify the policies configuration.
754
754
@@ -1087,7 +1087,7 @@ The iOS Company Portal is now supported on devices enrolled using Apple's Automa
Intune now supports Android Enterprise corporate-owned devices with a work profile for OS versions Android 8 and above. Corporate-owned devices with a work profile is one of the corporate management scenarios in the Android Enterprise solution set. This scenario is for single user devices intended for corporate and personal use. This corporate-owned, personally enabled (COPE) scenario offers:
1090
+
Intune now supports Android Enterprise corporate-owned devices with a work profile for OS versions Android 8 and above. Corporateowned devices with a work profile is one of the corporate management scenarios in the Android Enterprise solution set. This scenario is for single user devices intended for corporate and personal use. This corporate-owned, personally enabled (COPE) scenario offers:
1091
1091
1092
1092
- work and personal profile containerization
1093
1093
- device-level control for admins
@@ -1153,7 +1153,7 @@ With the new settings, you can add UNC file shares as download source locations
1153
1153
1154
1154
We've made some changes to improve the usability of the [security baseline node](../protect/security-baselines.md) in the Microsoft Endpoint Manager admin center. Now when you drill in to **Endpoint security** > **Security baselines** and then select a security baseline type like the MDM Security Baseline, you're presented with the **Profiles** pane. On the Profiles pane, you view the profiles you've created for that Baseline type. Previously the console presented an Overview pane which included an aggregate data roll up that didn't always match the details found in the reports for individual profiles.
1155
1155
1156
-
Unchanged, from the Profiles pane you can select a profile to drill-in to view that profiles properties as well as various reports that are available under *Monitor*. Similarly, at the same level as Profiles you can still select **Versions** to view the various versions of that profile type that you've deployed. When you drill-in to a version, you also gain access to reports, similar to the profile reports.
1156
+
Unchanged, from the Profiles pane you can select a profile to drillin to view that profiles properties as well as various reports that are available under *Monitor*. Similarly, at the same level as Profiles you can still select **Versions** to view the various versions of that profile type that you've deployed. When you drillin to a version, you also gain access to reports, similar to the profile reports.
1157
1157
1158
1158
#### Derived credentials support for Windows<!-- 4886090 -->
1159
1159
@@ -1184,7 +1184,7 @@ Later, if recovery is needed, a user can always use any device to view their per
1184
1184
1185
1185
#### Improved view of security baseline details for devices<!-- 5536846 -->
1186
1186
1187
-
Now you can drill-in to the details for a device to view the settings details for security baselines that apply to the device. The settings appear in a simple, flat list, which includes the setting category, setting name, and status. For more information, see [View Endpoint security configurations per device](../protect/security-baselines-monitor.md).
1187
+
Now you can drillin to the details for a device to view the settings details for security baselines that apply to the device. The settings appear in a simple, flat list, which includes the setting category, setting name, and status. For more information, see [View Endpoint security configurations per device](../protect/security-baselines-monitor.md).
1188
1188
1189
1189
<!-- vvvvvvvvvvvvvvvvvvvvvv -->
1190
1190
### Monitor and troubleshoot
@@ -1411,7 +1411,7 @@ You can change a device's primary user for co-managed Windows devices. For more
1411
1411
1412
1412
#### Setting the Intune primary user also sets the Azure AD owner property<!--7319227 -->
1413
1413
1414
-
This new feature automatically sets the owner property on newly-enrolled Hybrid Azure AD joined devices at the same time that the Intune primary user is set. For more information on the primary user, see [Find the primary user of an Intune device](../remote-actions/find-primary-user.md).
1414
+
This new feature automatically sets the owner property on newlyenrolled Hybrid Azure AD joined devices at the same time that the Intune primary user is set. For more information on the primary user, see [Find the primary user of an Intune device](../remote-actions/find-primary-user.md).
1415
1415
1416
1416
This is a change to the enrollment process and only applies to newly enrolled devices. For existing Hybrid Azure AD Joined devices, you must manually update the Azure AD Owner property. To do this, you can use the [Change primary user feature](../remote-actions/find-primary-user.md#change-a-devices-primary-user) or [a script](https://github.com/microsoftgraph/powershell-intune-samples/tree/master/ManagedDevices).
1417
1417
@@ -2946,7 +2946,7 @@ For more information about Android device administrator in Intune, see [Android
2946
2946
You can now see a paged list of Apple Automated Device Enrollment Program (DEP) devices that are associated with a profile. You can search the list from any page in the list. To see the list, go to **Intune** > **Device enrollment** > **Apple enrollment** > **Enrollment program tokens** > choose a token > **Profiles** > choose a profile > **Assigned devices** (under **Monitor**).
2947
2947
2948
2948
#### iOS User Enrollment in Preview<!-- 4817900 -->
2949
-
Apple's iOS 13.1 release includes User Enrollment, a new form of lightweight management for iOS devices. It can be used in place of Device Enrollment or Automated Device Enrollment (formerly Device Enrollment Program) for personally-owned devices. Intune's Preview is supporting this feature set by letting you:
2949
+
Apple's iOS 13.1 release includes User Enrollment, a new form of lightweight management for iOS devices. It can be used in place of Device Enrollment or Automated Device Enrollment (formerly Device Enrollment Program) for personallyowned devices. Intune's Preview is supporting this feature set by letting you:
2950
2950
2951
2951
- Target User Enrollment to user groups.
2952
2952
- Give end users the ability to select between lighter User Enrollment or stronger Device Enrollment when they enroll their devices.
@@ -3136,7 +3136,7 @@ These settings include:
3136
3136
- Safari
3137
3137
- Autofill
3138
3138
- Cloud and Storage
3139
-
- Backup to iCloud
3139
+
- Back up to iCloud
3140
3140
- Block iCloud Document sync
3141
3141
- Block iCloud Keychain sync
3142
3142
@@ -3621,7 +3621,7 @@ The [report for BitLocker and device encryption](../protect/encryption-monitor.m
3621
3621
The home page of the Company Portal app for iOS devices has been redesigned. With this change, the home page will better follow iOS UI patterns, and also provide improved discoverability for apps and ebooks.
3622
3622
3623
3623
#### Changes to Company Portal enrollment for iOS 12 device users<!--3448635 -->
3624
-
The Company Portal for iOS enrollment screens and steps have been updated to align with the MDM enrollment changes released in Apple iOS 12.2. The updated workflow prompts users to:
3624
+
The Company Portal for iOS enrollment screens and steps has been updated to align with the MDM enrollment changes released in Apple iOS 12.2. The updated workflow prompts users to:
3625
3625
3626
3626
* Allow Safari to open the Company Portal website and download the management profile before returning to the Company Portal app.
3627
3627
* Open the Settings app to install the management profile on their device.
@@ -5000,7 +5000,7 @@ New rules are available that let you automatically remove devices that haven't c
5000
5000
5001
5001
#### Corporate-owned, single use support for Android devices<!-- 1630973 -->
5002
5002
5003
-
Intune now supports highly-managed, locked-down, kiosk-style Android devices. This allows admins to further lock down the usage of a device to a single app or small set of apps, and prevents users from enabling other apps or performing other actions on the device. To set up Android kiosk, go to Intune > **Device enrollment** > **Android enrollment** > **Kiosk and task device enrollments**. For more information, see [Set up enrollment of Android enterprise kiosk devices](../enrollment/android-kiosk-enroll.md).
5003
+
Intune now supports highlymanaged, locked-down, kiosk-style Android devices. This allows admins to further lock down the usage of a device to a single app or small set of apps, and prevents users from enabling other apps or performing other actions on the device. To set up Android kiosk, go to Intune > **Device enrollment** > **Android enrollment** > **Kiosk and task device enrollments**. For more information, see [Set up enrollment of Android enterprise kiosk devices](../enrollment/android-kiosk-enroll.md).
5004
5004
5005
5005
#### Per-row review of duplicate corporate device identifiers uploaded<!-- 2203794-->
5006
5006
When uploading corporate IDs, Intune now provides a list of any duplicates and gives you the option to replace or keep the existing information. The report will appear if there are duplicates after you choose **Device enrollment** > **Corporate Device Identifiers** > **Add Identifiers**.
@@ -6738,7 +6738,7 @@ You can now assign line of business (LOB) apps for [iOS](../apps/lob-apps-ios.md
6738
6738
6739
6739
- **Connections to AirPlay devices** - Controls which [AirPlay devices](../configuration/ios-device-features-settings.md) (like Apple TV) that end users of iOS device can connect to.
6740
6740
6741
-
- **Custom lock screen message** - Configures a custom message that users will see on the lock screen of their iOS device, that replaces the default lock screen message. For more information, see [Activate lost mode on iOS devices](../remote-actions/device-lost-mode.md)
6741
+
- **Custom lock screen message** - Configures a custom message that users will see on the lock screen of their iOS device that replaces the default lock screen message. For more information, see [Activate lost mode on iOS devices](../remote-actions/device-lost-mode.md)
6742
6742
6743
6743
#### Restrict push notifications for iOS apps<!-- 723767 -->
6744
6744
In an Intune device restriction profile, you can now configure the following [notification settings](../configuration/ios-device-features-settings.md#app-notifications) for iOS devices:
@@ -6775,7 +6775,7 @@ Devices that run Samsung Knox Standard are now supported for [multi-user managem
6775
6775
We've added support for additional [Windows device restriction settings](../configuration/device-restrictions-windows-10.md) like additional Microsoft Edge browser support, device lock screen customization, start menu customizations, Windows Spotlight search set wallpaper, and proxy setting.
6776
6776
6777
6777
#### Multi-user support for Windows 10 Creators Update<!-- 822547 -->
6778
-
We've added support for [multi-user management](../enrollment/windows-enroll.md) for devices that run the Windows 10 Creators Update and are Azure Active Directory domain-joined. This means that when different standard users log into the device with their Azure AD credentials, they will receive any apps and policies that were assigned to their user name. Users cannot currently use the Company Portal for self-service scenarios like installing apps.
6778
+
We've added support for [multi-user management](../enrollment/windows-enroll.md) for devices that run the Windows 10 Creators Update and are Azure Active Directory domain-joined. This means that when different standard users log in to the device with their Azure AD credentials, they will receive any apps and policies that were assigned to their user name. Users cannot currently use the Company Portal for self-service scenarios like installing apps.
6779
6779
6780
6780
#### Fresh Start for Windows 10 PCs<!-- 1004830 -->
6781
6781
A new [Fresh Start device action](../remote-actions/device-fresh-start.md) for Windows 10 PCs is now available. When you issue this action, any apps that were installed on the PC are removed, and the PC is automatically updated to the latest version of Windows. This can be used to help remove pre-installed OEM apps that are often delivered with a new PC. You can configure if user data is retained when this device action is issued.
0 commit comments