Skip to content

Commit 63e86fe

Browse files
authored
Merge pull request #6889 from MicrosoftDocs/main
merge main to live Thursday morning
2 parents 24f03fc + ac75a2c commit 63e86fe

10 files changed

Lines changed: 188 additions & 37 deletions

File tree

memdocs/intune/configuration/vpn-settings-ios.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: MandiOhlinger
88
ms.author: mandia
99
manager: dougeby
10-
ms.date: 02/23/2022
10+
ms.date: 02/24/2022
1111
ms.topic: conceptual
1212
ms.service: microsoft-intune
1313
ms.subservice: configuration
@@ -275,38 +275,38 @@ These settings apply when you choose **Connection type** > **IKEv2**.
275275

276276
- **I want to do the following**: If there's a match between the device value and your on-demand rule, then select the action you want the device to do. Your options:
277277

278-
- **Establish VPN**: If there's a match between the device value and your on-demand rule, then a VPN connection is created.
278+
- **Establish VPN**: If there's a match between the device value and your on-demand rule, then the device connects to the VPN.
279279
- **Disconnect VPN**: If there's a match between the device value and your on-demand rule, then the VPN connection is disconnected.
280280
- **Evaluate each connection attempt**: If there's a match between the device value and your on-demand rule, then use the **Choose whether to connect** setting to decide what happens for *each* VPN connection attempt:
281281
- **Connect if needed**: If the device is on an internal network, or if there's already an established VPN connection to the internal network, then the on-demand VPN won't connect. These settings aren't used.
282282

283283
If there isn't an existing VPN connection, then for *each* VPN connection attempt, decide if users should connect using a DNS domain name. This rule only applies to domains in the **When users try to access these domains** list. All other domains are ignored.
284284

285-
- **When users try to access these domains**: Enter one or more DNS domains, like `contoso.com`. If users try to connect to a domain in this list, then the device uses DNS to resolve the domains you enter. If the domain doesn't resolve, meaning it doesn't have access to internal resources, then a VPN connection is created on-demand. If the domain does resolve, meaning it already has access to internal resources, then a VPN connection isn't created.
285+
- **When users try to access these domains**: Enter one or more DNS domains, like `contoso.com`. If users try to connect to a domain in this list, then the device uses DNS to resolve the domains you enter. If the domain doesn't resolve, meaning it doesn't have access to internal resources, then it connects to the VPN on-demand. If the domain does resolve, meaning it already has access to internal resources, then it doesn't connect to the VPN.
286286

287-
- If the **When users try to access these domains** setting is empty, then the device uses the DNS servers configured on the network connection service (Wi-Fi/ethernet) to resolve the domain.
287+
- If the **When users try to access these domains** setting is empty, then the device uses the DNS servers configured on the network connection service (Wi-Fi/ethernet) to resolve the domain. The idea is that these DNS servers are public servers.
288288

289-
The idea is that these DNS servers are public servers and the domains in the **When users try to access these domains** list are internal resources. Internal resources aren’t on public DNS servers and can't be resolved. So, the device creates a VPN connection. Now, the domain is resolved using the VPN connection’s DNS servers and the internal resource is available.
289+
The domains in the **When users try to access these domains** list are internal resources. Internal resources aren’t on public DNS servers and can't be resolved. So, the device connects to the VPN. Now, the domain is resolved using the VPN connection’s DNS servers and the internal resource is available.
290290

291-
If the device is on the internal network, the domain resolves, and a VPN connection isn't created because the internal domain is already available. You don't want to waste VPN resources on devices already on the internal network.
291+
If the device is on the internal network, then the domain resolves, and a VPN connection isn't created because the internal domain is already available. You don't want to waste VPN resources on devices already on the internal network.
292292

293293
- If the **When users try to access these domains** setting is populated, then the DNS servers on this list are used to resolve the domains in the list.
294294

295-
The idea is the opposite of the first bullet (**When users try to access these domains** setting is empty). For instance, the **When users try to access these domains** list has internal DNS servers. A device on an external network can't route to the internal DNS servers. The name resolution times out, and a VPN connection is created on-demand. Now the internal resources are available.
295+
The idea is the opposite of the first bullet (**When users try to access these domains** setting is empty). For instance, the **When users try to access these domains** list has internal DNS servers. A device on an external network can't route to the internal DNS servers. The name resolution times out, and the device connects to the VPN on-demand. Now the internal resources are available.
296296

297297
Remember this only applies to domains in the **When users try to access these domains** list. All other domains are resolved with public DNS servers. When the device is connected to the internal network, the DNS servers in the list are accessible, and there's no need to create a VPN connection.
298298

299299
- **Use the following DNS servers to resolve these domains (optional)**: Enter one or more DNS server IP addresses, like `10.0.0.22`. The DNS servers you enter are used to resolve the domains in the **When users try to access these domains** setting.
300300

301-
- **When this URL is unreachable, force-connect the VPN**: Optional. Enter an HTTP or HTTPS probing URL that the rule uses as a test. This URL is probed every time a user tries to access a domain in the **When users try to access these domains** setting. The user doesn't see the URL string probe site.
301+
- **When this URL is unreachable, force-connect the VPN**: Optional. Enter an HTTP or HTTPS probing URL that the rule uses as a test. For example, enter `https://probe.Contoso.com `. This URL is probed every time a user tries to access a domain in the **When users try to access these domains** setting. The user doesn't see the URL string probe site.
302302

303-
If the probe fails because the URL is unreachable or doesn't return a 200 HTTP status code, then a VPN connection is created.
303+
If the probe fails because the URL is unreachable or doesn't return a 200 HTTP status code, then the device connects to the VPN.
304304

305-
The idea is that the URL is only accessible on the internal network. If the URL can be accessed, then a VPN connection isn't needed. If the URL can't be accessed, then the device is on an external network, and a VPN connection is created on-dmand. Once the VPN connection is established, internal resources are available.
305+
The idea is that the URL is only accessible on the internal network. If the URL can be accessed, then a VPN connection isn't needed. If the URL can't be accessed, then the device is on an external network, and it connects to the VPN on-demand. Once the VPN connection is established, internal resources are available.
306306

307-
- **Never connect**: For each VPN connection attempt, when users try to access the domains you enter, then a VPN connection is never created.
307+
- **Never connect**: For each VPN connection attempt, when users try to access the domains you enter, then the device never connects to the VPN.
308308

309-
- **When users try to access these domains**: Enter one or more DNS domains, like `contoso.com`. If users try to connect to a domain in this list, then a VPN connection isn't created. If they try to connect to a domain not in this list, then a VPN connection is created.
309+
- **When users try to access these domains**: Enter one or more DNS domains, like `contoso.com`. If users try to connect to a domain in this list, then a VPN connection isn't created. If they try to connect to a domain not in this list, then the device connects to the VPN.
310310

311311
- **Ignore**: If there's a match between the device value and your on-demand rule, then a VPN connection is ignored.
312312

@@ -316,9 +316,9 @@ These settings apply when you choose **Connection type** > **IKEv2**.
316316
- **Specific search domains**: Enter one or more DNS domains that the rule will apply. For example, enter `contoso.com`.
317317
- **All domains**: Select this option to apply your rule to all domains in your organization.
318318

319-
- **But only if this URL probe succeeds**: Optional. Enter a URL that the rule uses as a test. If the device accesses this URL without redirection, then the VPN connection is started. And, the device connects to the target URL. The user doesn't see the URL string probe site.
319+
- **But only if this URL probe succeeds**: Optional. Enter a URL that the rule uses as a test. For example, enter `https://probe.Contoso.com `. If the device accesses this URL without redirection, then the VPN connection is started. And, the device connects to the target URL. The user doesn't see the URL string probe site.
320320

321-
For example, a URL string probe is an auditing Web server URL that checks device compliance before connecting the VPN. Or, the URL tests the VPN's ability to connect to a site before the device connects to the target URL through the VPN.
321+
For example, the URL tests the VPN's ability to connect to a site before the device connects to the target URL through the VPN.
322322

323323
- **Block users from disabling automatic VPN**: Your options:
324324

memdocs/intune/developer/reports-proc-get-a-link-powerbi.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords: Intune Data Warehouse
77
author: Erikre
88
ms.author: erikre
99
manager: dougeby
10-
ms.date: 12/16/2021
10+
ms.date: 02/24/2022
1111
ms.topic: reference
1212
ms.service: microsoft-intune
1313
ms.subservice: developer
@@ -101,8 +101,8 @@ With a client authenticated to Azure AD, the OData URL connects to the RESTful e
101101

102102
## Next steps
103103

104-
You can find the answers to questions about your environment such as the number of devices enrolled by day over the last week. You can gain insight into your Intune tenant and client population using the Intune Data Warehouse Power BI reports retrieved from the blade in the Microsoft Endpoint Management admin center. However, Intune provides a number of additional ways to extend or reuse the data. Power BI and the Intune Data Warehouse API provide additional functionality, for example:
104+
You can find the answers to questions about your environment such as the number of devices enrolled by day over the last week. You can gain insight into your Intune tenant and client population using the Intune Data Warehouse Power BI reports retrieved from the blade in the Microsoft Endpoint Manager admin center. However, Intune provides a number of additional ways to extend or reuse the data. Power BI and the Intune Data Warehouse API provide additional functionality, for example:
105105

106106
<!-- - You can use Power BI Desktop to create additional report types with your data. For example, you could create a custom chart representing the ratio of device manufactures in your enterprise. For more information about creating custom reports with Power BI and the Intune Data Warehouse, see `BLOG POST ON POWER BI`. -->
107107
- Your tenant data is organized to help you pull insight from your data. For more information about how the data is organized, see [Data Warehouse Data Model](reports-ref-data-model.md).
108-
- You can also access the data from a RESTful interface and incorporate the data into your own app. For more information, see [Get data from the Data Warehouse API with a REST client](reports-proc-data-rest.md).
108+
- You can also access the data from a RESTful interface and incorporate the data into your own app. For more information, see [Get data from the Data Warehouse API with a REST client](reports-proc-data-rest.md).

memdocs/intune/fundamentals/whats-new.md

Lines changed: 117 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: Erikre
88
ms.author: erikre
99
manager: dougeby
10-
ms.date: 02/11/2022
10+
ms.date: 02/24/2022
1111
ms.topic: conceptual
1212
ms.service: microsoft-intune
1313
ms.subservice: fundamentals
@@ -60,6 +60,122 @@ You can use RSS to be notified when this page is updated. For more information,
6060
### Scripts
6161
-->
6262

63+
## Week of February 21, 2022 (Service release 2202)
64+
65+
### Device security
66+
67+
#### Mobile Threat Defense partner Zimperium is now available in GCC High tenants<!-- 10013537 -->
68+
Zimperium is now available as a Mobile Threat Defense (MTD) partner in US GCC High environments.
69+
70+
With this support, you’ll find the Intune [connector for Zimperium](../protect/zimperium-mobile-threat-defense-connector.md) as available in the list of [MTD connectors that you can enable](../protect/mtd-connector-enable.md#to-enable-the-mobile-threat-defense-connector) in your GCC High tenant.
71+
72+
The GCC High environment is a more regulated environment, and only connectors for those MTD partners that are supported for the GCC High environment are available in it. For more information about support in GCC High tenants, [Microsoft Intune for US Government GCC High and DoD service description](/enterprise-mobility-security/solutions/ems-intune-govt-service-description).
73+
74+
#### Manage the app inventory data for iOS/iPadOS devices that Intune sends to third-party MTD partners<!-- 10722315 -->
75+
You can now configure the type of application inventory data for personally-owned iOS/iPadOS devices that Intune sends to your chosen third-party Mobile Threat Defense (MTD) partner.
76+
77+
To control the app inventory data, configure the following setting as part of the *MDM Compliance Policy Settings* on the [Mobile Threat Defense connector](../protect/mtd-connector-enable.md#to-enable-the-mobile-threat-defense-connector) for your partner:
78+
79+
- **Send full application inventory data on personally-owned iOS/iPadOS Devices**
80+
81+
Options for this setting include:
82+
- **On** - If your MTD partner syncs app data and requests a list of the iOS/iPadOS applications from Intune, that list includes unmanage apps (those not deployed through Intune) in addition to those deployed through Intune. This is the current behavior.
83+
- **Off** - Data about unmanaged apps won’t be provided, and the MTD partner only receives details about apps that were deployed through Intune.
84+
85+
For corporate devices, data about managed and unmanaged apps continues to be included with requests for app data by your MTD vendor.
86+
87+
### Device management
88+
89+
#### Support for Audio Alert on Android Dedicated (COSU) devices<!-- 10567852 -->
90+
You can now use the **Play lost device sound** device action to trigger an alarm sound on the device to assist in locating the lost or stolen Android Enterprise dedicated device.
91+
For more information, see [Locate lost or stolen devices](../remote-actions/device-locate.md).
92+
93+
#### UI updates when creating an on-demand VPN device configuration policy on iOS/iPadOS devices<!-- 13092960 -->
94+
You can create an on-demand VPN connection for your iOS/iPadOS devices (**Devices** > **Configuration profiles** > **Create profile** > **iOS/iPadOS** for platform > **VPN** for profile type > **Automatic VPN** > **On-demand VPN**).
95+
96+
The UI is updated to closer match Apple's technical naming. To see the on-demand VPN settings you can configure, go to [Automatic VPN settings on iOS and iPadOS devices](../configuration/vpn-settings-ios.md#automatic-vpn).
97+
98+
Applies to:
99+
- iOS/iPadOS
100+
101+
#### On Android Enterprise, use the Connect Automatically setting on enterprise Wi-Fi profiles<!-- 10697036 -->
102+
On Android Enterprise devices, you can create Wi-Fi profiles that include common enterprise Wi-Fi settings (**Devices** > **Configuration profiles** > **Create profile** > **Android Enterprise** for platform > **Fully Managed, Dedicated, and Corporate-Owned work profile** > **Wi-Fi** for profile type > **Enterprise** for Wi-Fi type).
103+
104+
You can configure the **Connect automatically** setting that automatically connects to your Wi-Fi network when devices are in range.
105+
106+
To see the settings you can configure, go to [Add Wi-Fi settings for Android Enterprise dedicated and fully managed devices](../configuration/wi-fi-settings-android-enterprise.md).
107+
108+
Applies to:
109+
- Android Enterprise corporate owned fully managed (COBO)
110+
- Android Enterprise corporate owned dedicated devices (COSU)
111+
112+
#### Deprecated status in Group Policy Analytics migration readiness report automatically reevaluates your GPOs<!-- 7983435 -->
113+
Using Group Policy Analytics, you can import your Group Policy Objects (GPOs) to see the settings that are supported in MDM providers, including Microsoft Intune. It also shows any deprecated settings, or settings not available to MDM providers.
114+
115+
The Intune product team updates the mapping logic. When the updates happen, the deprecated settings are automatically reevaluated. Previously, you had to reimport your GPOs.
116+
117+
For more information on Group Policy Analytics and the reporting, see [Analyze your on-premises group policy objects (GPO) using Group Policy analytics in Microsoft Endpoint Manager](../configuration/group-policy-analytics.md).
118+
119+
Applies to:
120+
- Windows 11
121+
- Windows 10
122+
123+
#### Create terms of use for Android (AOSP) user-associated devices<!-- 8506575 -->
124+
Require Android (AOSP) users to accept your terms and conditions in the Intune Company Portal app before they enroll their devices. This feature is available for corporate-owned, user-associated devices only. For more information about creating terms of use in Intune, see [Terms and conditions for user access](../enrollment/terms-and-conditions-create.md).
125+
126+
### Enforce Azure AD terms of use with Microsoft Intune or Microsoft Intune Enrollment cloud apps<!-- 12522105 -->
127+
Use the Microsoft Intune cloud app and/or Microsoft Intune Enrollment cloud app to enforce a conditional access, Azure AD Terms of Use acceptance policy on iOS and iPadOS devices during automated device enrollment. This functionality is available when you select Setup Assistant with modern authentication as your authentication method. Both cloud apps now ensure that users accept the terms of use during enrollment and/or during Company Portal sign-in if required by your conditional access policy.
128+
129+
#### New macOS settings in the Settings Catalog<!-- 12987685 -->
130+
The [Settings Catalog](../configuration/settings-catalog.md) lists all the settings you can configure in a device policy, and all in one place. When you create a Settings Catalog policy, there are new settings available for macOS devices (**Devices** > **Configuration profiles** > **Create profile** > **macOS** for platform > **Settings catalog (preview)** for profile type).
131+
132+
New settings include:
133+
134+
- Domains > Email Domains
135+
136+
- Printing > Printing:
137+
- Allow Local Printers
138+
- Default Printer
139+
- Device URI
140+
- Display Name
141+
- Footer Font Name
142+
- Footer Font Size
143+
- Print Footer
144+
- Print MAC Address
145+
- Require Admin To Add Printers
146+
- Show Only Managed Printers
147+
- User Printer List
148+
- Device URI
149+
- Display Name
150+
- Location
151+
- Model
152+
- PPD URL
153+
- Printer Locked
154+
155+
- Profile Removal Password > Removal Password
156+
157+
- Global HTTP Proxy:
158+
- Proxy Captive Login Allowed
159+
- Proxy PAC Fallback Allowed
160+
- Proxy PAC URL
161+
- Proxy Password
162+
- Proxy Server
163+
- Proxy Server Port
164+
- Proxy Type
165+
- Proxy Username
166+
167+
For more information about configuring Settings catalog profiles in Intune, see [Create a policy using settings catalog](../configuration/settings-catalog.md).
168+
169+
### Monitor and troubleshoot
170+
171+
#### Remote help is moving in the Microsoft Endpoint Manager admin center<!-- 12868177 -->
172+
The remote help page in the Microsoft Endpoint Manager admin center has moved and its now available directly under **Tenant administration** instead of **Connectors and tokens**.
173+
For more information about remote help, see [Use remote help](../remote-actions/remote-help.md).
174+
175+
176+
177+
178+
63179
## Week of February 7, 2022
64180

65181
### Device security

0 commit comments

Comments
 (0)