You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
For more general information, see [Added folder support for nodes in the Software Library](../../technical-preview-2202.md#bkmk_folder).
32
+
33
+
### Modified cmdlets
34
+
35
+
#### New-CMSoftwareUpdateDeployment
36
+
37
+
For more information, see [New-CMSoftwareUpdateDeployment](/powershell/module/configurationmanager/New-CMSoftwareUpdateDeployment).
38
+
39
+
**Non-breaking changes**
40
+
41
+
Added parameter **PreDownloadUpdateContent** to support [pre-download for available software updates](../../technical-preview-2202.md#bkmk_pre-download).
42
+
43
+
#### Set-CMSoftwareUpdateDeployment
44
+
45
+
For more information, see [Set-CMSoftwareUpdateDeployment](/powershell/module/configurationmanager/Set-CMSoftwareUpdateDeployment).
46
+
47
+
**Non-breaking changes**
48
+
49
+
Added parameter **PreDownloadUpdateContent** to support [pre-download for available software updates](../../technical-preview-2202.md#bkmk_pre-download).
Copy file name to clipboardExpand all lines: memdocs/configmgr/core/get-started/2022/includes/2203/9070525.md
+11-3Lines changed: 11 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,10 +4,18 @@ ms.author: mstewart
4
4
ms.prod: configuration-manager
5
5
ms.technology: configmgr-core
6
6
ms.topic: include
7
-
ms.date: 03/01/2022
7
+
ms.date: 03/02/2022
8
8
ms.localizationpriority: medium
9
9
---
10
10
11
-
## <aname="bkmk_anchor"></a> Feature Name
12
-
<!--CMADO#-->
11
+
## <aname="bkmk_dark"></a> Dark theme for the console
12
+
<!--9070525-->
13
+
The Configuration Manager console now offers a dark theme. To use the theme, select the arrow from the top left of the ribbon, then choose **Switch console theme**. Select **Switch console theme** again to return to the light theme. Using a console theme can help you easily distinguish a test environment from a production environment or one hierarchy from another.
13
14
15
+
The console dark theme is a [pre-release](../../../../servers/manage/pre-release-features.md) feature. Currently, there are certain locations in the console that may not display the dark theme correctly.
16
+
17
+
:::image type="content" source="../../media/9070525-dark-theme.png" alt-text="Screenshot of the Configuration Manager using the dark theme for the console. The 'Switch console theme' option is displayed in the upper right corner of the image.":::
18
+
19
+
### Known issue
20
+
21
+
When you first switch to a different theme, you may notice the node navigation pane doesn't properly render when you move to a new workspace. To work around this issue, restart the console.
# Application protection policies and personally-owned work profiles on Android Enterprise devices in Intune
33
+
# Mobile Application Management and personally-owned work profiles on Android Enterprise devices in Intune
34
34
35
35
In many organizations, administrators are challenged to protect resources and data on different devices. One challenge is protecting resources for users with personal Android Enterprise devices, also known as bring-your-own-device (BYOD). Microsoft Intune supports two Android deployment scenarios for bring-your-own-device (BYOD):
36
36
37
-
-[App protection policies without enrollment (APP-WE)](../apps/android-deployment-scenarios-app-protection-work-profiles.md#app-we)
-[Android Enterprise personally-owned work profiles](../apps/android-deployment-scenarios-app-protection-work-profiles.md#android-enterprise-personally-owned-work-profiles)
39
39
40
-
The APP-WE and the Android Enterprise personally-owned work profile deployment scenarios include the following key features important for BYOD environments:
40
+
The MAM and the Android Enterprise personally-owned work profile deployment scenarios include the following key features important for BYOD environments:
41
41
42
42
-**Protection and segregation of organization-managed data**: Both solutions protect organization data by enforcing data loss prevention (DLP) controls on organization-managed data. These protections prevent accidental leaks of protected data, such as an end user accidentally sharing it to a personal app or account. They also serve to ensure that a device accessing the data is healthy and not compromised.
43
43
44
-
-**End-user privacy**: APP-WE and Android Enterprise personally-owned work profiles separate end users content on the device, and data managed by the mobile device management (MDM) administrator. In both scenarios, IT admins enforce policies, such as PIN-only authentication on organization-managed apps or identities. IT admins are unable to read, access, or erase data that's owned or controlled by end users.
44
+
-**End-user privacy**: MAM separates end user and organization content in managed applications and Android Enterprise personally-owned work profiles separate end users content on the device, and data managed by the mobile device management (MDM) administrator. In both scenarios, IT admins enforce policies, such as PIN-only authentication on organization-managed apps or identities. IT admins are unable to read, access, or erase data that's owned or controlled by end users.
45
45
46
-
Whether you choose APP-WE or Android Enterprise personally-owned work profiles for your BYOD deployment depends on your requirements and business needs. The goal of this article is to provide guidance to help you decide. For more information related to managed Android devices, see [Manage Android personally-owned/corporate-owned work profile devices with Intune](../enrollment/android-enterprise-overview.md).
46
+
Whether you choose MAM or Android Enterprise personally-owned work profiles for your BYOD deployment depends on your requirements and business needs. The goal of this article is to provide guidance to help you decide. For more information related to managed Android devices, see [Manage Android personally-owned/corporate-owned work profile devices with Intune](../enrollment/android-enterprise-overview.md).
47
47
48
48
## About Intune app protection policies
49
49
@@ -65,11 +65,11 @@ To see a list of apps enabled with APP, see [managed apps with a rich set of mob
65
65
66
66
## Deployment scenarios
67
67
68
-
This section describes the important characteristics of the APP-WE and Android Enterprise personally-owned work profile deployment scenarios.
68
+
This section describes the important characteristics of the MAM and Android Enterprise personally-owned work profile deployment scenarios.
69
69
70
-
### APP-WE
70
+
### MAM
71
71
72
-
An APP-WE (app protection policies without enrollment) deployment defines policies on apps, not devices. In this scenario, devices typically aren't enrolled or managed by an MDM authority, such as Intune. To protect apps and access to organizational data, administrators use APP-manageable apps, and apply data protection policies to these apps.
72
+
A MAM deployment defines policies on apps, not devices. For BYOD, MAM is often used on unenrolled devices. To protect apps and access to organizational data, administrators use APP-manageable apps, and apply data protection policies to these apps.
73
73
74
74
This feature applies to:
75
75
@@ -78,8 +78,6 @@ This feature applies to:
78
78
> [!TIP]
79
79
> For more information, see [What are app protection policies?](app-protection-policy.md).
80
80
81
-
APP-WE scenarios are for end users who want a small organizational footprint on their devices, and don't want to enroll in MDM. As an administrator, you still need to protect your data. These devices aren't managed. So common MDM tasks and features, such as WiFi, device VPN, and certificate management, aren't part of this deployment scenario.
82
-
83
81
### Android Enterprise personally-owned work profiles
84
82
85
83
Android Enterprise personally-owned work profiles are the core Android Enterprise deployment scenario and the only scenario targeted at BYOD use cases. The Android Enterprise personally-owned work profile is a separate partition created at the Android OS level that can be managed by Intune.
@@ -88,7 +86,7 @@ An Android Enterprise personally-owned work profile includes the following featu
88
86
89
87
-**Traditional MDM functionality**: Key MDM capabilities, such as app lifecycle management using managed Google Play, is available in any Android Enterprise scenario. Managed Google Play provides a robust experience to install and update apps without any user intervention. IT can also push app configuration settings to organizational apps. It also doesn't require end users to allow installations from unknown sources. Other common MDM activities, such as deploying certificates, configuring WiFi/VPNs, and setting device passcodes are available with Android Enterprise personally-owned work profiles.
90
88
91
-
-**DLP on the Android Enterprise personally-owned work profile boundary**: Like APP-WE, IT can enforce data protection policies. With a Android Enterprise personally-owned work profile, DLP policies are enforced at the work profile level, not the app level. For example, copy/paste protection is enforced by the APP settings applied to an app, or enforced by the work profile. When the app is deployed into a work profile, administrators can pause copy/paste protection to the work profile by turning off this policy at the APP level.
89
+
-**DLP on the Android Enterprise personally-owned work profile boundary**: With a Android Enterprise personally-owned work profile, DLP policies are enforced at the work profile level, not the app level. For example, copy/paste protection is enforced by the APP settings applied to an app, or enforced by the work profile. When the app is deployed into a work profile, administrators can pause copy/paste protection to the work profile by turning off this policy at the APP level.
92
90
93
91
## Tips to optimize the work profile experience
94
92
@@ -102,9 +100,9 @@ Android Enterprise personally-owned Work profiles and APP complement each other'
102
100
103
101
### Suppress APP policy for Android Enterprise personally-owned work profiles
104
102
105
-
You may need to support individual users who have multiple devices - unmanaged devices in an APP-WE scenario, and managed devices with Android Enterprise personally-owned work profiles.
103
+
You may need to support individual users who have multiple devices - unenrolled devices with MAM managed applications and managed devices with Android Enterprise personally-owned work profiles.
106
104
107
-
For example, you require end users to enter a PIN when opening a work app. Depending on the device, the PIN features are handled by APP or by the work profile. For the APP-WE devices, the PIN-to-launch behavior is enforced by APP. For work profile devices, you can use a device or work profile PIN enforced by the OS. To accomplish this scenario, configure APP settings so that they don't apply *when* an app is deployed into a work profile. If you don't configure it this way, the end user gets prompted for a PIN by the device, and again at the APP layer.
105
+
For example, you require end users to enter a PIN when opening a work app. Depending on the device, the PIN features are handled by APP or by the work profile. For MAM managed applications, access controls including the PIN-to-launch behavior is enforced by APP. For enrolled devices, the APP PIN may be disabled to avoid requiring both a device PIN and an APP PIN. (APP PIN setting for [Android](../apps/app-protection-policy-settings-android.md#access-requirements). For work profile devices, you can use a device or work profile PIN enforced by the OS. To accomplish this scenario, configure APP settings so that they don't apply *when* an app is deployed into a work profile. If you don't configure it this way, the end user gets prompted for a PIN by the device, and again at the APP layer.
108
106
109
107
### Control multi-identity behavior in Android Enterprise personally-owned work profiles
110
108
@@ -131,7 +129,7 @@ For example, customers in or have users in China can't use Android device manage
131
129
132
130
## Summary
133
131
134
-
Using Intune, both APP-WE and Android Enterprise personally-owned work profiles are available for your Android BYOD program. To choose APP-WE or work profiles depends upon your business and usage requirements. In summary, use Android Enterprise personally-owned work profiles if you need MDM activities on managed devices, such as certificate deployment, app push, and so on. Use APP-WE if you don't want or can't manage devices, and are using only Intune APP-enabled apps.
132
+
Using Intune, both MAM and Android Enterprise personally-owned work profiles are available for your Android BYOD program. You can choose to use MAM and/or work profiles depending upon your business and usage requirements. In summary, use Android Enterprise personally-owned work profiles if you need MDM activities on managed devices, such as certificate deployment, app push, and so on. Use MAM if you want to protect org data within applications.
135
133
136
134
## Next steps
137
135
[Start using app protection policies](app-protection-policy.md), or [enroll your devices](../enrollment/android-enroll.md).
Copy file name to clipboardExpand all lines: memdocs/intune/apps/apps-deploy.md
+3-2Lines changed: 3 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ keywords:
8
8
author: Erikre
9
9
ms.author: erikre
10
10
manager: dougeby
11
-
ms.date: 12/16/2021
11
+
ms.date: 02/28/2021
12
12
ms.topic: how-to
13
13
ms.service: microsoft-intune
14
14
ms.subservice: apps
@@ -132,7 +132,8 @@ The information in the following table can help you understand the resulting int
132
132
> When conflicts occur in **Uninstall on device removal** setting, the app is not removed from the device when the device is no longer managed.
133
133
134
134
## Managed Google Play app deployment to unmanaged devices
135
-
For unenrolled Android devices, you can use Managed Google Play to deploy store apps and line-of-business (LOB) apps to users. Once deployed, you can use [Mobile Application Management (MAM)](../apps/android-deployment-scenarios-app-protection-work-profiles.md#app-we) to manage the applications. Managed Google Play apps targeted as **Available with or without enrollment** will appear in the Play Store app on the end user's device, and not in the Company Portal app. End user will browse and install apps deployed in this manner from the Play app. Because the apps are being installed from managed Google Play, the end user will not need to alter their device settings to allow app installation from unknown sources, which means the devices will be more secure. If the app developer publishes a new version of an app to Play that was installed on a user's device, the app will be automatically updated by Play.
135
+
136
+
For unenrolled Android devices, you can use Managed Google Play to deploy store apps and line-of-business (LOB) apps to users. Once deployed, you can use [Mobile Application Management (MAM)](../apps/android-deployment-scenarios-app-protection-work-profiles.md#mam) to manage the applications. Managed Google Play apps targeted as **Available with or without enrollment** will appear in the Play Store app on the end user's device, and not in the Company Portal app. End user will browse and install apps deployed in this manner from the Play app. Because the apps are being installed from managed Google Play, the end user will not need to alter their device settings to allow app installation from unknown sources, which means the devices will be more secure. If the app developer publishes a new version of an app to Play that was installed on a user's device, the app will be automatically updated by Play.
136
137
137
138
Steps to assign a Managed Google Play app to unmanaged devices:
Copy file name to clipboardExpand all lines: memdocs/intune/apps/data-transfer-between-apps-manage-ios.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -66,7 +66,7 @@ Configuring the user UPN setting is **required** for devices that are managed by
66
66
> Additionally, the app needs to be either installed from the Intune Company Portal (if set as available) or pushed as required to the device.
67
67
68
68
> [!NOTE]
69
-
> Deploy IntuneMAMUPN app configuration settings to the target managed app which sends data, not the receiving app.
69
+
> Deploy IntuneMAMUPN app configuration settings to the target managed app which sends data. Adding the app configuration key to the receiving app is optional.
70
70
71
71
> [!NOTE]
72
72
> Currently, there is no support for enrolling with a different user on an app if there is a MDM enrolled account on the same device.
0 commit comments