Skip to content

Commit 6add9b1

Browse files
committed
erikre-wn2208-15111546 1.4
2 parents 730d2cf + a7cbfa7 commit 6add9b1

29 files changed

Lines changed: 174 additions & 88 deletions

memdocs/autopilot/enrollment-autopilot.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -52,13 +52,12 @@ ms.collection:
5252

5353
- **Group type**: Select **Security**.
5454
- **Group name** and **Group description**: Enter a name and description for your group.
55-
- **Azure AD roles can be assigned to the group**: **Yes** allows Azure AD roles to be assigned to the group you're creating. Once set, the group is permanently and always allowed to be assigned Azure AD roles. When set to **No**, Azure AD roles aren't assigned to this group.
55+
- **Azure AD roles can be assigned to the group**: Select **No**, Azure AD roles aren't assigned to this group.
5656

5757
For more information, see [Use cloud groups to manage role assignments in Azure AD](/azure/active-directory/roles/groups-concept).
5858

59-
- **Membership type**: Choose how devices become members of this group. Select **Assigned**, **Dynamic user**, or **Dynamic Device**. For more information, see [Add groups to organize users and devices](../intune/fundamentals/groups-add.md).
59+
- **Membership type**: Choose how devices become members of this group. Select **Dynamic Device**. For more information, see [Add groups to organize users and devices](../intune/fundamentals/groups-add.md).
6060
- **Owners**: Select users that own the group. Owners can also delete this group.
61-
- **Members**: Select Autopilot devices that belong to this group. Autopilot devices that aren't enrolled show the serial number for the device name.
6261
- **Dynamic device members**: Select **Add dynamic query** > **Add expression**.
6362

6463
Create rules using Autopilot device attributes. Autopilot devices that meet these rules are automatically added to the group. Creating an expression using non-autopilot attributes doesn't guarantee that devices included in the group are registered to Autopilot.

memdocs/autopilot/existing-devices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ If you want, you can set up an [enrollment status page](enrollment-status.md) (E
8585
Make sure the user account you specify has sufficient administrative rights.
8686
8787
```powershell
88-
Connect-MSGraphApp
88+
Connect-MSGraph
8989
```
9090
9191
Windows requests the user and password for your account with a standard Azure AD form. Type your username and password, and then select **Sign in**.

memdocs/autopilot/self-deploying.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ Optionally, you can use a [device-only subscription](https://techcommunity.micro
7171
Self-deploying mode uses a device's TPM 2.0 hardware to authenticate the device into an organization's Azure AD tenant. Therefore, devices without TPM 2.0 can't be used with this mode. Devices must also support TPM device attestation. All new Windows devices should meet these requirements. The TPM attestation process also requires access to a set of HTTPS URLs that are unique for each TPM provider. For more information, see the entry for Autopilot self-Deploying mode and Autopilot pre-provisioning in [Networking requirements](networking-requirements.md#tpm). For Windows Autopilot software requirements, see [Windows Autopilot software requirements](./software-requirements.md).
7272

7373
> [!IMPORTANT]
74-
> If you attempt a self-deploying mode deployment on a device that does not have support TPM 2.0 or on a virtual machine, the process will fail when verifying the device with an 0x800705B4 timeout error (Hyper-V virtual TPMs are not supported). Also note that Windows 10, version 1903 or later is required to use self-deploying mode due to issues with TPM device attestation in Windows 10, version 1809. Since Windows 10 Enterprise 2019 LTSC is based on Windows 10 version 1809, self-deploying mode is also not supported on Windows 10 Enterprise 2019 LTSC.
74+
> If you attempt a self-deploying mode deployment on a device that does not have support TPM 2.0 or on a virtual machine, the process will fail when verifying the device with an 0x800705B4 timeout error (Hyper-V virtual TPMs are not supported). Also note that Windows 10, version 1903 or later is required to use self-deploying mode due to issues with TPM device attestation in Windows 10, version 1809.
7575
>
7676
> See [Windows Autopilot known issues](known-issues.md) and [Troubleshoot Autopilot device import and enrollment](troubleshoot-device-enrollment.md) to review other known errors and solutions.
7777

memdocs/autopilot/windows-autopilot-whats-new.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,10 @@ ms.topic: article
1717

1818
# Windows Autopilot: What's new
1919

20+
## Updates to Autopilot device targeting infrastructure
21+
22+
With Intune 2208 we are updating the Autopilot infrastructure to ensure that the profiles and applications assigned are consistently ready when the devices are deployed. This change reduces the amount of data that needs to be synchronized per-Autopilot device and leverages device lifecycle change events to reduce the amount of time that it takes to recover from device resets for Azure AD and Hybrid Azure AD joined devices. No action is needed to enable this change, it will be rolling out to all clients starting August 2022.
23+
2024
## Update Intune Connector for Active Directory for Hybrid Azure AD joined devices
2125
<!-- 2209 -->
2226

memdocs/configmgr/desktop-analytics/whats-new.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ ms.localizationpriority: medium
2020
>
2121
> To align investments with this shift, **Desktop Analytics will be retired on November 30, 2022**. Over the next year, the types of insights currently found in Desktop Analytics will be incorporated directly into the Microsoft Endpoint Manager admin center.<!-- 10946169 -->
2222
>
23-
> For more information, see [A data-driven approach to managing devices in your organization](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/a-data-driven-approach-to-managing-devices-in-your-organization/ba-p/2932082).
23+
> For more information, see [Preview app and driver compatibility insights in Endpoint Manager](https://techcommunity.microsoft.com/t5/windows-it-pro-blog/preview-app-and-driver-compatibility-insights-in-endpoint/ba-p/3482136).
2424
2525
## July 2021
2626

memdocs/configmgr/tenant-attach/breadcrumb/toc.yml

Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,3 +21,24 @@ items:
2121
- name: Tenant attach
2222
tocHref: /mem/intune/protect/
2323
topicHref: /mem/configmgr/tenant-attach/index
24+
25+
- name: Docs
26+
tocHref: /
27+
topicHref: /
28+
items:
29+
- name: Enterprise Mobility + Security
30+
tocHref: /enterprise-mobility-security/
31+
topicHref: /enterprise-mobility-security/
32+
items:
33+
- name: Microsoft Endpoint Manager
34+
tocHref: /mem/
35+
topicHref: /mem/
36+
items:
37+
- name: Configuration Manager
38+
tocHref: /mem/configmgr/
39+
topicHref: /mem/configmgr/index
40+
items:
41+
- name: Tenant attach
42+
tocHref: /mem/configmgr/cloud-attach/
43+
topicHref: /mem/configmgr/tenant-attach/index
44+

memdocs/intune/apps/app-protection-framework.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ keywords:
88
author: Erikre
99
ms.author: erikre
1010
manager: dougeby
11-
ms.date: 06/10/2022
11+
ms.date: 08/15/2022
1212
ms.topic: conceptual
1313
ms.service: microsoft-intune
1414
ms.subservice: apps
@@ -129,9 +129,7 @@ The policies in level 1 enforce a reasonable data access level while minimizing
129129
| Simple PIN | Allow | iOS/iPadOS, Android | |
130130
| Select Minimum PIN length | 4 | iOS/iPadOS, Android | |
131131
| Touch ID instead of PIN for access (iOS 8+/iPadOS) | Allow | iOS/iPadOS | |
132-
| Fingerprint instead of PIN for access (Android 9.0+) | Allow | Android | |
133-
| Override biometrics with PIN after timeout | Require | iOS/iPadOS | |
134-
| Override fingerprint with PIN after timeout | Require | Android | |
132+
| Override biometrics with PIN after timeout | Require | iOS/iPadOS, Android | |
135133
| Timeout (minutes of activity) | 720 | iOS/iPadOS, Android | |
136134
| Face ID instead of PIN for access (iOS 11+/iPadOS) | Allow | iOS/iPadOS | |
137135
| Biometric instead of PIN for access | Allow | iOS/iPadOS, Android | |
@@ -215,6 +213,8 @@ The policy settings enforced in level 3 include all the policy settings recommen
215213
| Select Minimum PIN length | 6 | iOS/iPadOS, Android |
216214
| PIN reset after number of days | Yes | iOS/iPadOS, Android |
217215
| Number of days | 365 | iOS/iPadOS, Android |
216+
| Class 3 Biometrics (Android 9.0+)​ | Require | Android |
217+
| Override Biometrics with PIN after biometric updates | Require | Android |
218218

219219
#### Conditional launch
220220

memdocs/intune/apps/app-protection-policy-settings-android.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ keywords:
88
author: Erikre
99
ms.author: erikre
1010
manager: dougeby
11-
ms.date: 06/10/2022
11+
ms.date: 08/15/2022
1212
ms.topic: conceptual
1313
ms.service: microsoft-intune
1414
ms.subservice: apps
@@ -120,10 +120,11 @@ For more information, see [Data transfer policy exceptions for apps](app-protect
120120
|<ol><br>**PIN type** |Set a requirement for either numeric or passcode type PINs before accessing an app that has app protection policies applied. Numeric requirements involve only numbers, while a passcode can be defined with at least 1 alphabetical letter **or** at least 1 special character. <br><br> Default value = **Numeric**<br><br> **Note:** Special characters allowed include the special characters and symbols on the Android English language keyboard. |
121121
|<ul><b> **Simple PIN** |Select **Allow** to allow users to use simple PIN sequences like *1234*, *1111*, *abcd* or *aaaa*. Select **Blocks** to prevent them from using simple sequences. Simple sequences are checked in 3 character sliding windows. If **Block** is configured, 1235 or 1112 would not be accepted as PIN set by the end user, but 1122 would be allowed. <br><br>Default value = **Allow** <br><br>**Note:** If Passcode type PIN is configured, and Simple PIN is set to Allow, the user needs at least one letter **or** at least one special character in their PIN. If Passcode type PIN is configured, and Simple PIN is set to Block, the user needs at least one number **and** one letter **and** at least one special character in their PIN. </li> |
122122
|<ul><b> **Select minimum PIN length** |Specify the minimum number of digits in a PIN sequence. <br><br>Default value = **4** |
123-
|<ul><b> **Fingerprint instead of PIN for access (Android 9.0+)** |Select **Allow** to allow the user to use [fingerprint authentication](https://developer.android.com/about/versions/marshmallow/android-6.0.html#fingerprint-authentication) instead of a PIN for app access. <br><br>Default value = **Allow** <br><br>**Note:** This feature supports generic controls for biometric on Android devices. OEM-specific biometric settings, like Samsung Pass, *are not supported.* <br><br>On Android, you can let the user prove their identity by using [Android fingerprint authentication](https://developer.android.com/about/versions/marshmallow/android-6.0.html#fingerprint-authentication) instead of a PIN. When the user tries to use this app with their work or school account, they are prompted to provide their fingerprint identity instead of entering a PIN. <br><br> Android personally owned work profile enrolled devices require registering a separate fingerprint for the **Fingerprint instead of PIN for access** policy to be enforced. This policy takes effect only for policy-managed apps installed in the Android personally owned work profile. The separate fingerprint must be registered with the device after the Android personally owned work profile is created by enrolling in the Company Portal. For more information about personally owned work profile fingerprints using Android personally owned work profiles, see [Lock your work profile](https://support.google.com/work/android/answer/7029958). |
124-
|<ul><b>**Override fingerprint with PIN after timeout** |To use this setting, select **Require** and then configure an inactivity timeout. <br><br>Default value = **Require** |
125-
|<ul><b><ul><b> **Timeout (minutes of inactivity)** |Specify a time in minutes after which either a passcode or numeric (as configured) PIN will override the use of a fingerprint. This timeout value should be greater than the value specified under 'Recheck the access requirements after (minutes of inactivity)'.<br><br>Default value = **30** |
126-
|<ul><b>**Biometrics instead of PIN for access** |Select **Allow** to allow the user to use Face Unlock to authenticate users on Android devices. If allowed, Face Unlock is used to access the app on Android 10 or higher devices. |
123+
|<ul><b>**Biometrics instead of PIN for access** |Select **Allow** to allow the user to use biometrics to authenticate users on Android devices. If allowed, biometrics is used to access the app on Android 10 or higher devices. |
124+
|<ul><b>**Override biometric with PIN after timeout** |To use this setting, select **Require** and then configure an inactivity timeout. <br><br>Default value = **Require** |
125+
|<ul><b><ul><b> **Timeout (minutes of inactivity)** |Specify a time in minutes after which either a passcode or numeric (as configured) PIN will override the use of a biometric. This timeout value should be greater than the value specified under 'Recheck the access requirements after (minutes of inactivity)'.<br><br>Default value = **30** |
126+
|<ul><b> **Class 3 biometrics (Android 9.0+)** | Select **Require** to require the user to sign in with class 3 biometrics. For more information on class 3 biometrics, see [Biometrics](https://source.android.com/docs/security/biometric) in Google's documentation. |
127+
|<ul><b> **Override biometrics with PIN after biometric updates​** | Select **Require** to override the use of biometrics with PIN when a change in biometrics is detected.<p><p>**NOTE:**<br>Depending on the Android device manufacturer, not all forms of biometrics may be supported for cryptographic operations. Currently, cryptographic operations are supported for any biometric (e.g., fingerprint, iris, or face) on the device that meets or exceeds the requirements for Class 3 biometrics, as defined in the Android documentation. See the `BIOMETRIC_STRONG` constant of the [BiometricManager.Authenticators](https://developer.android.com/reference/android/hardware/biometrics/BiometricManager.Authenticators#BIOMETRIC_STRONG) interface and the `authenticate` method of the [BiometricPrompt](https://developer.android.com/reference/android/hardware/biometrics/BiometricPrompt#authenticate(android.hardware.biometrics.BiometricPrompt.CryptoObject,%20android.os.CancellationSignal,%20java.util.concurrent.Executor,%20android.hardware.biometrics.BiometricPrompt.AuthenticationCallback)) class. You may need to contact your device manufacturer to understand the device-specific limitations. |
127128
|<ul><b>**PIN reset after number of days** |Select **Yes** to require users to change their app PIN after a set period of time, in days. <br><br>When set to *Yes*, you then configure the number of days before the PIN reset is required. <br><br> Default value = **No** |
128129
|<ul><b><ul><b> **Number of days** |Configure the number of days before the PIN reset is required. <br><br> Default value = **90** |
129130
|<ul><b>**Select number of previous PIN values to maintain** |This setting specifies the number of previous PINs that Intune will maintain. Any new PINs must be different from those that Intune is maintaining. <br><br> Default value = **0** |

memdocs/intune/configuration/device-restrictions-windows-10.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -445,11 +445,9 @@ This device restrictions profile is directly related to the kiosk profile you cr
445445
- **Clear browsing data on exit** (desktop only): **Yes** clears the history, and browsing data when users exit Microsoft Edge. **No** (default) uses the OS default, which may cache the browsing data.
446446
- **Sync browser settings between user's devices**: Choose how you want to sync browser settings between devices. Your options:
447447
- **Allow**: Allow syncing of Microsoft Edge browser settings between user's devices
448-
- **Block and enable user override**: Block syncing of Microsoft Edge browser settings between user's devices. Users can override this setting.
448+
- **Block and enable user override**: Block syncing of Microsoft Edge browser settings between user's devices. Users can override this setting. When this option is selected, users can override the admin designation.
449449
- **Block**: Block syncing of Microsoft Edge browser setting between users devices. Users can't override this setting.
450450

451-
When "block and enable user override" is selected, user can override admin designation.
452-
453451
- **Allow Password Manager**: **Yes** (default) allows Microsoft Edge to automatically use Password Manager, which allows users to save and manage passwords on the device. **No** prevents Microsoft Edge from using Password Manager.
454452
- **Cookies**: Choose how cookies are handled in the web browser. Your options:
455453
- **Allow**: Cookies are stored on the device.

memdocs/intune/developer/app-sdk-android.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -155,7 +155,10 @@ integration points relevant to your app.
155155
156156
### Gradle Build Plugin
157157
If your app does not build with gradle, skip to [Integrating with the
158-
Command Line Tool](#command-line-build-tool).
158+
Command Line Tool](#command-line-build-tool).
159+
160+
> [!NOTE]
161+
> Android Gradle Plugin 4.2 introduced a number of resources optimizations in order to reduce the size of the APK package. One of these optimizations is the obfuscation/shortening of filenames. For now, the workaround is to add android.enableResourceOptimizations=false in the app's gradle.properties. This will prevent the optimization from happening thus allowing the detection of the Intune SDK when uploading the app into the Portal.
159162
160163
The App SDK plugin is distributed as part of the SDK as
161164
**GradlePlugin/com.microsoft.intune.mam.build.jar**. For Gradle to be

0 commit comments

Comments
 (0)