You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
### Global quiet time app policy settings<!-- 15424417 -->
70
+
The global quiet time settings will allow you to create policies to schedule quiet time for your end users which will automatically mute Microsoft Outlook email and Teams notifications on iOS/iPadOS and Android platforms. These policies can be used to limit end user notifications received after work hours. When this feature is available, you will be able to find it in [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) by selecting **Apps** > **Quiet Time** > **Policies**.
71
+
72
+
### Select default work apps in Intune Company Portal<!-- 14531482 -->
73
+
Android device users will be able to select and save their preferred work apps in Intune Company Portal. They'll be able to select the default apps they want to use for a specific intent or file type, and change or remove their preferences. Company Portal will securely store the device user's preferred defaults. This feature is an enhancement to the Android MAM custom app picker, which is a part of the Android MAM SDK.
74
+
75
+
### Use filters with app configuration profiles for managed devices<!-- 7423842 -->
76
+
You will be able to use filters to refine the assignment scope when deploying app configuration profiles for managed devices.
77
+
You can first create a filter using any of the available properties for iOS and Android. Then, in [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) you can assign your managed app configuration profile by selecting **Apps** > **App configuration policies** > **Add** > **Managed devices** and go to the assignment page. After selecting a group, you can refine the applicability of the policy by choosing a filter and deciding to use it in **Include** or **Exclude** mode. For related information about filters, see [Use filters when assigning your apps, policies, and profiles in Microsoft Endpoint Manager](../fundamentals/filters.md).
78
+
67
79
## Device management
68
80
81
+
### Intune support for Linux Ubuntu LTS desktops will be generally available<!-- 14616038 -->
82
+
Intune will support Linux Ubuntu LTS desktops. The following initial functionality is planned for this first release for Linux desktop management:
83
+
- Enroll Linux Ubuntu LTS (22.04 and 20.04) desktops into Microsoft Endpoint Manager
84
+
- Enable access to corporate resources via Microsoft Edge
85
+
- Conditional Access enforcement in Microsoft Edge
86
+
- Standard Compliance policies
87
+
- Linux distribution
88
+
- Device encryption
89
+
- Password complexity
90
+
- Bash script support for custom compliance policies
91
+
92
+
### New hardware details available for individual devices running on iOS/iPadOS<!-- 15038076 -->
93
+
Select **Devices** > **All devices** > *select one of your listed devices* and open it's **Hardware** details. The following new details are available in the **Hardware** pane of individual devices:
94
+
95
+
-**Battery level**: Shows the battery level of the device anywhere between 0 and 100, or defaults to null if the battery level cannot be determined. This is available for devices running iOS/iPadOS 5.0 and later.
96
+
-**Resident users**: Shows the number of users currently on the shared iPad device, or defaults to null if the number of users cannot be determined. This is available for devices running iOS/iPadOS 13.4 and later.
97
+
98
+
For more information, see [View device details with Microsoft Intune](../remote-actions/device-inventory.md).
99
+
100
+
Applies to:
101
+
- iOS/iPadOS
102
+
103
+
### Endpoint security firewall rules support for ICMP type<!-- 5653356 -->
104
+
We’re adding a new setting named **IcmpTypesAndCodes** to the endpoint security firewall rules template for Windows 10. To configure this in the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) by selecting **Endpoint security** > **Firewall** > **Create Policy** > Platform: *Windows 10, Windows 11, and Windows Server* > Profile: *Microsoft Defender Firewall Rules*).
105
+
106
+
With this new setting you’ll be able to configure inbound and outbound rules for [Internet Control Message Protocol](/windows/security/threat-protection/windows-firewall/create-an-inbound-icmp-rule) (ICMP) as part of a firewall rule.
107
+
108
+
Applies to:
109
+
- Windows 10, Windows 11, and Windows Server
110
+
69
111
### Support for Locate device on Android Enterprise corporate owned fully managed and Android Enterprise corporate owned work profile devices<!-- 12391424 -->
70
112
You'll be able to use "Locate device" on Android Enterprise corporate owned fully managed and Android Enterprise corporate owned work profile devices. Using this feature, admins will be able to locate lost or stolen corporate devices on-demand. To do this, in [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Devices**, and then select **All devices**. From the list of devices you manage, select a supported device, and choose the **Locate device** remote action.
71
113
@@ -81,13 +123,68 @@ Applies to:
81
123
82
124
## Device enrollment
83
125
126
+
### iOS/iPadOS Setup Assistant with modern authentication supports Just in Time Registration (public preview)<!-- 15515188 -->
127
+
Intune will support Just in Time Registration for iOS/iPadOS enrollment scenarios that use Setup Assistant with modern authentication. Just in Time Registration reduces the number of authentication prompts shown to users throughout the provisioning experience, giving them a more seamless onboarding experience. It eliminates the need to have the Company Portal app for Azure AD registration and compliance checks, while automatically establishing SSO across the device. Just In Time Registration will be available in public preview for devices enrolling through Apple Automated Device Enrollment and running iOS/iPadOS 13.0 or later.
128
+
84
129
### Windows Autopilot diagnostics will capture ESP failures<!-- 1895390 -->
85
130
Windows Autopilot diagnostics will automatically capture diagnostics about Windows Autopilot failures that occur on the Enrollment Status Page (ESP). Diagnostics will be available to download in the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
### New settings for Device Firmware Configuration Interface (DFCI) profiles on Windows devices<!-- 15511597 -->
137
+
You can create a DFCI profile that enables the Windows OS to pass management commands from Intune to UEFI (Unified Extensible Firmware Interface) (**Devices** > **Configuration profiles** > **Create profile** > **Windows 10 and later** for platform > **Templates > Device Firmware Configuration Interface**).
138
+
139
+
You can use this feature to control BIOS settings. There will be new settings you can configure in the DFCI policy:
140
+
141
+
- Cameras:
142
+
- Front camera
143
+
- Infrared camera
144
+
- Rear camera
145
+
146
+
- Radios:
147
+
- WWAN
148
+
- NFC
149
+
150
+
- Ports
151
+
- SD Card
152
+
153
+
For more information on DFCI profiles, go to [Use Device Firmware Configuration Interface (DFCI) profiles on Windows devices in Microsoft Intune](../configuration/device-firmware-configuration-interface-windows.md) and [DFCI profile settings list](../configuration/device-firmware-configuration-interface-windows-settings.md).
154
+
155
+
Applies to:
156
+
- Windows 11 on supported UEFI
157
+
- Windows 10 RS5 (1809) and later on supported UEFI
158
+
159
+
### New settings available in the iOS/iPadOS and macOS Settings Catalog<!-- 15514929 -->
160
+
The [Settings Catalog](../configuration/settings-catalog.md) lists all the settings you can configure in a device policy, and all in one place.
161
+
162
+
New settings are available in the Settings Catalog. In the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), you can see these settings at **Devices** > **Configuration profiles** > **Create profile** > **iOS/iPadOS** or **macOS** for platform > **Settings catalog** for profile type.
163
+
164
+
New settings include:
165
+
166
+
**Networking > Cellular**:
167
+
- Enable XLAT464
168
+
169
+
Applies to:
170
+
- iOS/iPadOS
171
+
172
+
**Privacy > Privacy Preferences Policy Control**:
173
+
- System Policy App Bundles
174
+
175
+
Applies to:
176
+
- macOS
177
+
178
+
**Restrictions**:
179
+
- Allow Rapid Security Response Installation
180
+
- Allow Rapid Security Response Removal
181
+
182
+
Applies to:
183
+
- iOS/iPadOS
184
+
- macOS
185
+
186
+
For more information about configuring Settings Catalog profiles in Intune, see [Create a policy using settings catalog](../configuration/settings-catalog.md).
187
+
91
188
### Filter app and group policy assignments using Windows 11 SE operating system SKUs<!-- 10588651 -->
92
189
When you assign an app or policy, you can filter the assignment using different device properties, such as device manufacturer, operating system SKU, and more.
93
190
@@ -131,6 +228,55 @@ Applies to:
131
228
132
229
## Device security
133
230
231
+
### Grant apps permission on Android Enterprise devices<!-- 12441244 -->
232
+
For Android Enterprise devices, you’ll soon be able to configure certificate profiles to silently grant specific apps access to use the certificate. This expands on the current behavior where a device user must approve the use of a certificate by an application.
233
+
234
+
You’ll be able to choose to grant certificate access silently to specific apps or to require user approval. When configured for specific apps, you’ll then select which apps have this access as part of the profile, while all other apps will continue to require user approval before being able to use the certificate.
235
+
236
+
This support will be added to profiles for SCEP, PKCS, PKCS imported, and Derived Credential certificate profiles.
237
+
238
+
Applies to:
239
+
- Android Enterprise devices that enroll as Fully Managed, Dedicated, and Corporate-Owned work Profile.
240
+
241
+
### Attack surface reduction rule exclusions on a per-rule basis<!-- 13385644 -->
242
+
Attack surface reduction rules provide valuable controls for protecting your devices. Currently, exclusions are only supported for all of the rules that are enabled on the device.
243
+
244
+
With Intune, you’ll soon be able to configure exclusions for your [attack surface reduction rules](../protect/endpoint-security-asr-policy.md) on a per-rule basis. This will allow you to define exclusions for individual rules versus an exclusion that applies to all of the attack surface reduction rules on a device.
245
+
246
+
Applies to:
247
+
- Windows 10/11
248
+
249
+
### Manage macOS software updates with Intune<!-- 9801186 -->
250
+
You’ll soon be able to use Intune policies to manage macOS software updates for devices that enrolled using Automated Device Enrollment (ADE). The policy will be available in the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) at **Devices** > **macOS** > **Update policies for macOS**.
251
+
252
+
Supported update types will include:
253
+
- Critical updates
254
+
- Firmware updates
255
+
- Configuration file updates
256
+
- All other updates (OS, built-in apps)
257
+
258
+
In addition to scheduling when a device updates, you’ll be able to manage behaviors like the following:
259
+
- Download and install: Download or install the update, depending on the current state.
260
+
- Download only: Download the software update without installing it.
261
+
- Install immediately: Download the software update and trigger the restart countdown notification.
262
+
- Notify only: Download the software update and notify the user through the App Store.
263
+
- Install later: Download the software update and install it at a later time.
264
+
- Not configured: No action taken on the software update.
265
+
266
+
For information from Apple about managing macOS software updates, see [Manage software updates for Apple devices - Apple Support](https://support.apple.com/guide/deployment/manage-software-updates-depc4c80847a/web) in the Apple's Platform Deployment documentation.
267
+
Apple maintains a list of security updates at [Apple security updates - Apple Support](https://support.apple.com/en-us/HT201222).
268
+
269
+
### Reusable groups of settings for removable storage in Device Control profiles<!-- 7351534 -->
270
+
You’ll soon be able to add reusable groups of settings to your profiles for device control profiles in your attack surface reduction policies. To configure device control profiles, go to [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) by selecting **Endpoint security** >**Attack surface reduction** > **Create Policy** > Platform: *Windows 10 and later* > Profile: *Device Control*.
271
+
272
+
The reusable groups for device control profiles will include a collection of settings that support managing *read*, *write*, and *execute* access for removable storage. Examples of common scenarios include:
273
+
- Prevent write and execute access to all but allow specific approved USBs
274
+
- Audit write and execute access to all but block specific unapproved USBs
275
+
- Only allow specific user groups to access specific removable storage on a shared PC
276
+
277
+
Applies to:
278
+
- Windows 10 or later
279
+
134
280
### Reusable groups of settings for Microsoft Defender Firewall Rules<!-- 5653346, 6009541 -->
135
281
You’ll soon be able to add reusable groups of settings to your profiles for Microsoft Defender Firewall Rules. The reusable groups are collections of remote IP addresses and FQDNs that you define one time and can then use with one or more firewall rule profiles. You’ll no longer need to reconfigure the same group of IP addresses in each individual profile that might require them.
Copy file name to clipboardExpand all lines: memdocs/intune/includes/intune-notices.md
+31-3Lines changed: 31 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,35 @@ ms.author: erikje
9
9
ms.custom: include file
10
10
---
11
11
12
-
These notices provide important information that can help you prepare for future Intune changes and features.
12
+
These notices provide important information that can help you prepare for future Intune changes and features.
13
+
14
+
### Plan for Change: Ending support for Company Portal authentication method for iOS/iPadOS ADE enrollment
15
+
16
+
As we continue to invest in Setup Assistant with modern authentication, which is the Apple supported path to require enrollment during Setup Assistant with optional multi-factor authentication, we plan to remove the Company Portal authentication method from new and existing iOS/iPadOS ADE enrollment profiles in Q1 2023. This will include removing the Run Company Portal in Single App Mode until authentication setting.
17
+
18
+
### How does this affect you or your users?
19
+
20
+
In November, new enrollments (new devices that are targeted with an existing enrollment profile or devices re-enrolling) that are targeted with an existing enrollment profile with the Company Portal authentication method, will not be able to enroll.
21
+
22
+
This will not impact existing enrolled devices unless the device is re-enrolled after this change. The device will not be able to re-enroll until the authentication method is switched in the enrollment profile to Setup Assistant with modern authentication.
23
+
24
+
New iOS/iPadOS enrollment profiles will not have the option to select Company Portal as the authentication method.
25
+
26
+
If you have not already, you will need to move to use Setup Assistant with modern authentication. Within the Microsoft Endpoint Manager admin center, you will want to either create a new ADE enrollment profile, or edit your existing enrollment profile to use the “Setup assistant with modern authentication.”
27
+
28
+
**User experience:** The Setup Assistant with modern authentication enrollment flow does change the enrollment screen order where authentication will occur prior to accessing the home screen. If you have user guides that share screenshots, you will want to update those so the guides match the experience of Setup Assistant with modern authentication.
29
+
30
+
### How can you prepare?
31
+
32
+
To enroll new devices (or re-enroll) after this change, you will either need to update existing profiles to move to Setup Assistant with modern authentication or create a new enrollment profile with this method.
33
+
34
+
For related information, see:
35
+
36
+
-[Move to Setup Assistant with Modern Authentication for Automated Device Enrollment](https://techcommunity.microsoft.com/t5/intune-customer-success/move-to-setup-assistant-with-modern-authentication-for-automated/ba-p/2556536)
37
+
-[Setup Assistant with Modern Auth for ADE (iOS/iPadOS 13+ and macOS 10.15+)](https://aka.ms/MEM-ADEModernAuth-Blog)
38
+
-[Using filters with Setup Assistant with modern auth for ADE for corporate iOS/iPadOS/macOS devices](https://techcommunity.microsoft.com/t5/intune-customer-success/using-filters-with-setup-assistant-with-modern-auth-for-ade-for/ba-p/2670379)
39
+
-[Enroll iOS/iPadOS devices by using ADE](../enrollment/device-enrollment-program-enroll-ios.md#create-an-apple-enrollment-profile)
40
+
-[Upcoming changes to iOS/iPadOS Company Portal app deployment for Setup Assistant with modern auth](https://aka.ms/ADE-CP-auto-deploy)
13
41
14
42
### Plan for Change: Ending support for Windows Information Protection
15
43
@@ -31,7 +59,7 @@ Microsoft strongly recommends that you move to a supported version of Windows 10
31
59
32
60
### How does this affect you or your users?
33
61
34
-
If you are managing Windows 8.1 devices those devices should be upgraded to a supported version of Windows 10 or Windows 11. There is no impact to existing devices and polices, however, you will not be able to enroll new devices if they are running Windows 8.1.
62
+
If you are managing Windows 8.1 devices those devices should be upgraded to a supported version of Windows 10 or Windows 11. There is no impact to existing devices and policies, however, you will not be able to enroll new devices if they are running Windows 8.1.
35
63
36
64
### How can you prepare?
37
65
@@ -52,7 +80,7 @@ If you're impacted by this change, see MC393815 in the Message center.
52
80
53
81
Download, install, and configure the latest certificate connector. For more information see, [Install the Certificate Connector for Microsoft Intune](../protect/certificate-connector-install.md).
54
82
55
-
To check which version of the certificate connector you are using follow these steps:
83
+
To check which version of the certificate connector you are using, follow these steps:
56
84
57
85
1. On a Windows Server running the Intune Certificate Connector, launch "Add or Remove programs".
58
86
2. A list of installed programs and applications will be displayed.
Copy file name to clipboardExpand all lines: windows-365/enterprise/create-provisioning-policy.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -58,7 +58,7 @@ A few things to keep in mind:
58
58
6. Select **Next**.
59
59
7. On the **Configuration** page, under **Windows settings**, choose a **Language & Region**. The selected language pack will be installed on Cloud PCs provisioned with this policy.
60
60
8. Optionally, under **Additional services**, choose a service to be installed on Cloud PCs provisioned with this policy:
61
-
-**Windows Autopatch (preview)** is a cloud service that automates updates for Windows, Microsoft 365 Apps for enterprise, Microsoft Edge, and Microsoft Teams on both physical and virtual devices. For more information, see [What is What is Windows Autopatch?](/windows/deployment/windows-autopatch/overview/windows-autopatch-overview) and the [Windows Autopatch FAQ](https://go.microsoft.com/fwlink/?linkid=2200228).
61
+
-**Windows Autopatch** is a cloud service that automates updates for Windows, Microsoft 365 Apps for enterprise, Microsoft Edge, and Microsoft Teams on both physical and virtual devices. For more information, see [What is What is Windows Autopatch?](/windows/deployment/windows-autopatch/overview/windows-autopatch-overview) and the [Windows Autopatch FAQ](https://go.microsoft.com/fwlink/?linkid=2200228).
62
62
-**Microsoft Managed Desktop** is a cloud service that helps with device deployment, service management and operations, and security. For more information, see [What is Microsoft Managed Desktop?](/managed-desktop/intro/)
63
63
9. Select **Next**.
64
64
10. On the **Assignments** page, choose **Select groups** > choose the groups you want this policy assigned to > **Select** > **Next**. Nested groups aren't currently supported.
0 commit comments