You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: memdocs/intune/fundamentals/in-development.md
+208-1Lines changed: 208 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ keywords:
8
8
author: dougeby
9
9
ms.author: dougeby
10
10
manager: dougeby
11
-
ms.date: 04/27/2022
11
+
ms.date: 05/05/2022
12
12
ms.topic: conceptual
13
13
ms.service: microsoft-intune
14
14
ms.subservice: fundamentals
@@ -65,13 +65,209 @@ You can use RSS to be notified when this article is updated. For more informatio
65
65
66
66
## App management
67
67
68
+
### Improved report data experience on the Managed Apps pane<!-- 10147133 -->
69
+
The **Managed Apps** pane will be updated to better display app data. You will be able to switch between displaying app data for the primary user and other users on a device, or display data for the device without any user. The generated app data will be displayed using the primary user of the device when the report is initially loaded, or displayed with no primary user if none exists. This capability will be available in [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) by selecting **Devices** > **Managed Apps**.
70
+
71
+
### Photo library outgoing data transfer support via app protection policies<!-- 14062176 -->
72
+
You will be able to select to include **Photo Library** as a supported application storage service for *outgoing* data. This support is in addition to *incoming* data transfer support for **Photo Library**. By selecting **Photo Library** in the **Allow users to open data from selected services** setting within Intune, you can allow managed accounts to send *outgoing* data to their device's photo library from their managed apps on iOS and Android platforms. In [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Apps** > **App protection policies** > **Create Policy**. Choose either **iOS/iPadOS** or **Android**. This setting will be available as part of the **Data protection** step and specifically for **Policy managed apps**. For related information, see [Data protection](../apps/app-protection-framework.md#data-protection-2).
The capability to deploy macOS LOB apps by uploading PKG-type installer files to Intune will be generally available. You can upload and deploy PKG-type installer files as macOS line-of-business apps. To add a macOS LOB app from [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Apps** > **macOS** > **Add** > **Line-of-business app**. Additionally, the App Wrapping Tool for macOS will no longer be required to deploy macOS LOB apps.
76
+
77
+
### Use MAM policies with COSU devices<!-- 13819227 -->
78
+
Intune-managed Android Enterprise corporate owned dedicated devices (COSU) in Azure Active Directory (AAD) shared mode will be able to receive MAM policies and be targeted separately from other Android enterprise devices. For more information about COSU, see [Android Enterprise dedicated devices](../fundamentals/deployment-guide-enrollment-android.md#android-enterprise-dedicated-devices).
79
+
80
+
### Push notification will always be sent when device ownership changes from Personal to Corporate<!-- 12390037 -->
81
+
We’ll soon change push notification behavior to ensure a notification is always sent when an admin changes a device's ownership from Personal to Corporate. With this change, we’re removing the following setting from the [*Customization* node](../apps/company-portal-app.md#device-ownership-notification) of the Microsoft Endpoint Manager admin center, which currently allows admins to turn off this notification behavior:
82
+
- Send a push notification to users when their device ownership type changes from personal to corporate (Android and iOS/iPadOS only)
83
+
84
+
These notifications are pushed through the Company Portal app on Android and iOS/iPadOS devices.
85
+
68
86
### iOS Company Portal minimum required version<!-- 13016075 -->
69
87
With an upcoming release of the MS Authenticator app, users will be required to update to v5.2205 of the iOS Company Portal. If you have enabled the **[Block installing apps using App Store](../configuration/device-restrictions-ios.md#settings-apply-to-automated-device-enrollment-supervised)** device restriction setting, you will likely need to push an update to the related devices that use this setting. Otherwise, no action is needed. If you have a helpdesk, you may want to make them aware of the prompt to update the Company Portal app. In most cases, users have app updates set to automatic, so they receive the updated Company Portal app without taking any action. Users that have an earlier app version will be prompted to update to the latest Company Portal app.
70
88
89
+
### iOS/iPadOS notifications will require March Company Portal or newer<!-- 14131757 -->
90
+
We plan to make service side updates to iOS/iPadOS notifications in Intune's May (2205) service release that will require users to have the March Company Portal (version 5.2203.1) or newer. If you are using functionality that could generate iOS/iPadOS Company Portal push notifications, you will want to ensure your users update the iOS/iPadOS Company Portal to continue receiving push notifications. There is no additional change in functionality. For related information, see [Update the Company Portal app](../user-help/install-a-new-version-of-the-company-portal-app.md).
### Support for Retire on Android Enterprise corporate-owned work-profiles devices<!-- 10216870 -->
97
+
You'll be able to use the **Retire** admin action in the **Endpoint Manager admin center** to remove the work profile including all corporate apps, data, and policies from an Android Enterprise corporate-owned work profile device. Go to **Endpoint Manager admin center** >**Devices** pane >**All Devices** > then select the name of the device you want to retire and select **Retire**.
98
+
99
+
When you select **Retire**, the device is unenrolled from Intune management. However, all the data and apps associated with your personal profile will remain untouched on the device.
100
+
For more information, see [Retire or wipe devices using Microsoft Intune](../remote-actions/devices-wipe.md).
101
+
102
+
### Initiate compliance checks for your AOSP devices from the Microsoft Intune app<!-- 12645739 -->
103
+
You'll be able to initiate a compliance check for your AOSP devices from the Microsoft Intune app. Go to **Device details**. This feature will be available on devices that are enrolled in Microsoft Intune app as user-associated (Android) AOSP devices.
104
+
105
+
### View a managed device's group membership<!-- 4100067 -->
106
+
In the monitor section of the **Devices** workload of Intune, you'll be able to view the group membership of all AAD groups for a managed device. When this is available, you will be able to select **Group Membership** by signing in to [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) and selecting **Devices**.
### Enroll to co-management from Windows Autopilot<!-- 11300628 -->
113
+
You'll be able to configure device enrollment in Intune to enable co-management, which happens during the [Windows Autopilot](../../autopilot/windows-autopilot.md) process. This behavior directs the workload authority in an orchestrated manner between Configuration Manager and Intune.
114
+
115
+
If the device is targeted with an [Autopilot enrollment status page (ESP) policy](../enrollment/windows-enrollment-status.md), the device will wait for Configuration Manager. The Configuration Manager client installs, registers with the site, and applies the production co-management policy. Then the Autopilot ESP continues.
116
+
117
+
### Improvements for enrollment profiles for Apple Automated Device Enrollment<!-- 13165752 -->
118
+
Two Setup Assistant skip panes are becoming generally available for Apple Automated Device Enrollment (ADE). The screen configurations were previously released in Intune for public preview. The following screens will be generally available for both iOS/iPadOS and macOS under the **Setup Assistant** tab:
119
+
120
+
- iOS/iPadOS 13 and later
121
+
- Pane name: **Get Started **
122
+
- Default: Show pane
123
+
- You can configure a setting in Intune that hides the Get Started pane in Setup Assistant during ADE enrollment.
124
+
125
+
- macOS 12 and later
126
+
- Pane name: **Auto Unlock with Apple Watch**
127
+
- Default: Show pane
128
+
- You can configure a setting in Intune that hides the Unlock Your Mac with your Apple Watch pane in Setup Assistant during ADE enrollment.
129
+
130
+
There is no change to functionality from the previous public preview release.
### New macOS settings in the Settings Catalog<!-- 13923348 -->
137
+
The Settings Catalog has new macOS settings you can configure (**Devices** > **Configuration profiles** > **Create profile** > **macOS** for platform >**Settings catalog (preview)** for profile type):
138
+
139
+
**Accounts > Accounts**:
140
+
141
+
- Disable Guest Account
142
+
- Enable Guest Account
143
+
144
+
**Accounts > Caldav**:
145
+
146
+
- Cal DAV Account Description
147
+
- Cal DAV Host Name
148
+
- Cal DAV Password
149
+
- Cal DAV Port
150
+
- Cal DAV Principal URL
151
+
- Cal DAV Use SSL
152
+
- Cal DAV Username
153
+
154
+
**Accounts > Carddav**:
155
+
156
+
- Card DAV Account Description
157
+
- Card DAV Host Name
158
+
- Card DAV Password
159
+
- Card DAV Port
160
+
- Card DAV Principal URL
161
+
- Card DAV Use SSL
162
+
- Card DAV Username
163
+
164
+
**Networking > Firewall**:
165
+
166
+
- Allow Signed
167
+
- Allow Signed App
168
+
- Enable Logging
169
+
- Logging Option
170
+
171
+
**Parental Controls > Parental Controls Time Limits**:
172
+
173
+
- Family Controls Enabled
174
+
- Time Limits
175
+
176
+
**Proxies > Network Proxy Configuration**:
177
+
178
+
- Proxies
179
+
- Exceptions List
180
+
- Fall Back Allowed
181
+
- FTP Enable
182
+
- FTP Passive
183
+
- FTP Port
184
+
- FTP Proxy
185
+
- Gopher Enable
186
+
- Gopher Port
187
+
- Gopher Proxy
188
+
- HTTP Enable
189
+
- HTTP Port
190
+
- HTTP Proxy
191
+
- HTTPS Enable
192
+
- HTTPS Port
193
+
- HTTPS Proxy
194
+
- Proxy Auto Config Enable
195
+
- Proxy Auto Config URL String
196
+
- Proxy Captive Login Allowed
197
+
- RTSP Enable
198
+
- RTSP Port
199
+
- RTSP Proxy
200
+
- SOCKS Enable
201
+
- SOCKS Port Integer
202
+
- SOCKS Proxy
203
+
204
+
**Security > Smart Card**:
205
+
206
+
- Allow Smart Card
207
+
- Check Certificate Trust
208
+
- Enforce Smart Card
209
+
- One Card Per User
210
+
- Token Removal Action
211
+
- User Pairing
212
+
213
+
**Software Update**:
214
+
215
+
- Allow Pre Release Installation
216
+
- Automatic Check Enabled
217
+
- Automatic Download
218
+
- Automatically Install App Updates
219
+
- Automatically Install Mac OS Updates
220
+
- Config Data Install
221
+
- Critical Update Install
222
+
- Restrict Software Update Require Admin To Install
223
+
224
+
**User Experience > Screensaver User**:
225
+
226
+
- Idle Time
227
+
- Module Name
228
+
- Module Path
229
+
230
+
There isn't any conflict resolution between policies created using the Settings catalog and policies created using Templates. When creating new policies in the Settings Catalog, be sure there are no conflicting settings with your current policies.
231
+
232
+
For more information about configuring Settings catalog profiles in Intune, see [Create a policy using settings catalog in Microsoft Intune](../configuration/settings-catalog.md).
233
+
234
+
Applies to:
235
+
- macOS
236
+
237
+
### Create and deploy Wi-Fi profiles to Android AOSP devices<!-- 8506299 -->
238
+
You'll be able to configure and deploy a Wi-Fi profile to your Android AOSP devices.
239
+
240
+
Applies to:
241
+
- Android (AOSP)
242
+
243
+
### Unlock Android Enterprise devices after a set time using password, PIN, or pattern<!-- 7913163 -->
244
+
On Android Enterprise devices, you can create a device restrictions configuration profile that manages device settings (**Devices** > **Configuration profiles** > **Create profile** > **Android Enterprise** > **Fully managed, dedicated, and corporate-owned work profile** for platform > **Device restrictions** for profile type).
245
+
246
+
There will be a new **How often pin, password, or pattern is needed to unlock** setting. Select how long users must unlock the device using a strong authentication method (password, PIN, or pattern). Your options:
247
+
-**24 hours since last pin, password, or pattern unlock**: The screen locks 24 hours after users last used a strong authentication method to unlock the device or work profile.
248
+
-**Device default** (default): The screen locks using the device's default time.
249
+
250
+
For a list of settings you can currently configure, go to [Android Enterprise device settings to allow or restrict features using Intune](../configuration/device-restrictions-android-for-work.md).
251
+
252
+
[2.3.4. Advanced passcode management](https://developers.google.com/android/work/requirements#2.3.-advanced-passcode-management_1) (opens Android's web site)
- Android Enterprise corporate owned work profile (COPE)
259
+
260
+
### Import custom ADMX and ADML administrative templates to create a device configuration profile<!-- 4970862 -->
261
+
You can create a device configuration policy that uses built-in ADMX templates (**Devices** > **Configuration profiles** > **Create profile** > **Windows 10 and later** for platform > **Templates** > **Administrative templates**).
262
+
263
+
You'll be able to import custom and 3rd party/partner ADMX and ADML templates into the Endpoint Manager admin center. Once imported, you can create a device configuration policy, assign the policy to your devices, and manage the settings in the policy.
264
+
265
+
For information on the built-in ADMX templates, see [Use Windows 10/11 templates to configure group policy settings in Microsoft Intune](../configuration/administrative-templates-windows.md).
266
+
267
+
Applies to:
268
+
- Windows 11
269
+
- Windows 10
270
+
75
271
### Use the Settings Catalog to create a Universal Print policy on Windows 11 devices<!-- 5513123 -->
76
272
Many organizations are moving their printer infrastructure to the cloud. [Universal Print](/universal-print/fundamentals/universal-print-whatis) is a cloud-based printing solution for Microsoft 365 customers. It uses built-in cloud printers, built-in legacy printers, and runs entirely in Microsoft Azure. When Universal Print is deployed with Universal Print-compatible printers, it doesn't require any on-premises infrastructure.
77
273
@@ -86,6 +282,17 @@ Applies to:
86
282
87
283
## Device security
88
284
285
+
### New settings to manage removable devices for Endpoint security Device control profiles<!-- 8844611 -->
286
+
We’re adding five new settings for Windows 10/11 to the [*device control* profile template](../protect/endpoint-security-asr-profile-settings.md#device-control) for Attack surface reduction policy in Endpoint Security. The new settings will help you manage the use of removable devices like a USB device, and to manage read and write access to removable disks like media players, cellular phones, displays, and CE devices.
### Microsoft Defender for Endpoint as the Tunnel client app for iOS will soon be out of Preview<!-- 9849514 -->
90
297
The preview version of Microsoft Defender for Endpoint that supports [Microsoft Tunnel](../protect/microsoft-tunnel-overview.md) on iOS/iPadOS will soon be out of preview and become generally available.
0 commit comments