Skip to content

Commit 7a76e35

Browse files
committed
erikre-doc-13511896
1 parent 63e86fe commit 7a76e35

1 file changed

Lines changed: 1 addition & 121 deletions

File tree

memdocs/intune/fundamentals/in-development.md

Lines changed: 1 addition & 121 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ keywords:
88
author: dougeby
99
ms.author: dougeby
1010
manager: dougeby
11-
ms.date: 02/09/2022
11+
ms.date: 02/24/2022
1212
ms.topic: conceptual
1313
ms.service: microsoft-intune
1414
ms.subservice: fundamentals
@@ -78,126 +78,6 @@ Win32 App Log collection via Intune Management Extension has moved to the Window
7878

7979
<!-- ***********************************************-->
8080

81-
## Device configuration
82-
83-
### On Android Enterprise, use the Connect Automatically setting on enterprise Wi-Fi profiles<!-- 10697036 -->
84-
85-
On Android Enterprise devices, you can create Wi-Fi profiles that include common enterprise Wi-Fi settings (**Devices** > **Configuration profiles** > **Create profile** > **Android Enterprise** for platform > **Fully Managed, Dedicated, and Corporate-Owned work profile** > **Wi-Fi** for profile type > **Enterprise** for Wi-Fi type).
86-
87-
You can configure the **Connect automatically** setting that automatically connects to your Wi-Fi network when devices are in range.
88-
89-
To see the settings you can currently configure, go to [Add Wi-Fi settings for Android Enterprise dedicated and fully managed devices](../configuration/wi-fi-settings-android-enterprise.md).
90-
91-
Applies to:
92-
93-
- Android Enterprise corporate owned fully managed (COBO)
94-
- Android Enterprise corporate owned dedicated devices (COSU)
95-
96-
### New macOS settings in the Settings Catalog<!-- 12987685 -->
97-
98-
The [Settings Catalog](../configuration/settings-catalog.md) lists all the settings you can configure in a device policy, and all in one place. When you create a Settings Catalog policy, there are new settings available for macOS devices (**Devices** > **Configuration profiles** > **Create profile** > **macOS** for platform > **Settings catalog (preview)** for profile type).
99-
100-
New settings include:
101-
102-
- Accounts > Caldav:
103-
- Cal DAV Account Description
104-
- Cal DAV Host Name
105-
- Cal DAV Password
106-
- Cal DAV Port
107-
- Cal DAV Principal URL
108-
- Cal DAV Username
109-
- Cal DAV Use SSL
110-
111-
- Accounts > Carddav:
112-
- Card DAV Account Description
113-
- Card DAV Host Name
114-
- Card DAV Password
115-
- Card DAV Port
116-
- Card DAV Principal URL
117-
- Card DAV Username
118-
- Card DAV Use SSL
119-
120-
- Networking > Domains > Email Domains
121-
122-
- Printing > Printing:
123-
- Allow Local Printers
124-
- Default Printer
125-
- Device URI
126-
- Display Name
127-
- Footer Font Name
128-
- Footer Font Size
129-
- Print Footer
130-
- Print MAC Address
131-
- Require Admin To Add Printers
132-
- Show Only Managed Printers
133-
- User Printer List
134-
- Device URI
135-
- Display Name
136-
- Location
137-
- Model
138-
- PPD URL
139-
- Printer Locked
140-
141-
- Profile Removal Password > Removal Password
142-
143-
- Proxies > Global HTTP Proxy:
144-
- Proxy Captive Login Allowed
145-
- Proxy PAC Fallback Allowed
146-
- Proxy PAC URL
147-
- Proxy Password
148-
- Proxy Server
149-
- Proxy Server Port
150-
- Proxy Type
151-
- Proxy Username
152-
153-
For more information about configuring Settings catalog profiles in Intune, see [Create a policy using settings catalog](../configuration/settings-catalog.md).
154-
155-
<!-- ***********************************************-->
156-
157-
## Device enrollment
158-
159-
### Enforce Azure AD terms of use with Microsoft Intune or Microsoft Intune Enrollment cloud apps<!-- 12522105 -->
160-
Use the Microsoft Intune cloud app or Microsoft Intune Enrollment cloud app to enforce a conditional access, Azure AD Terms of Use policy on iOS and iPadOS devices during automated device enrollment. Both apps will ensure that users accept the terms of use before enrolling if required by your conditional access policy. This functionality will be available when you select Setup Assistant with modern authentication as the authentication method.
161-
162-
<!-- ***********************************************-->
163-
164-
## Device management
165-
166-
### Create terms of use for Android (AOSP) user-associated devices<!-- 8506575 -->
167-
Require Android (AOSP) users to accept your organization's terms and conditions before using the Intune Company Portal app. This feature will be available for corporate-owned, user-associated devices only. For more information about creating terms of use in Intune, see [Terms and conditions for user access](../enrollment/terms-and-conditions-create.md).
168-
169-
### Support for Audio Alert on Android Dedicated (COSU) devices<!-- 10567852 -->
170-
You'll be able to use the **Play lost device sound** device action to trigger an alarm sound on the device to assist in locating the lost or stolen Android Enterprise dedicated device.
171-
172-
For more information, see [Locate lost or stolen devices](../remote-actions/device-locate.md).
173-
174-
<!-- ***********************************************-->
175-
176-
## Device security
177-
178-
### Manage the app inventory data for iOS/iPadOS devices that Intune sends to third-party MTD partners<!-- 10722315 -->
179-
180-
You’ll soon have more control over the application inventory data for personally-owned iOS/iPadOS devices that Intune sends to your chosen third-party Mobile Threat Defense (MTD) partner. You’ll configure what data is sent with a new setting that’s available when you configure the [Mobile Threat Defense connector](../protect/mtd-connector-enable.md#to-enable-the-mobile-threat-defense-connector). The new setting is **Send full application inventory data on personally-owned iOS/iPadOS Devices**.
181-
182-
For personally-owned iOS/iPadOS devices:
183-
184-
- When set to **On**: If your MTD partner syncs app data and requests a list of the iOS/iPadOS applications from Intune, that list includes unmanage apps (those not deployed through Intune) in addition to those deployed through Intune. This is the current behavior.
185-
- When set to **Off**: Data on unmanaged apps won’t be provided, and the MTD partner only receives details about apps that were deployed through Intune.
186-
187-
For corporate devices, data about managed and unmanaged apps continues to be included with requests for app data by your MTD vendor.
188-
189-
<!-- ***********************************************-->
190-
191-
## Monitor and troubleshoot
192-
193-
### Remote help is moving in the Microsoft Endpoint Manager admin center<!-- 12868177 -->
194-
195-
The remote help page in the Microsoft Endpoint Manager admin center is moving and will be directly under **Tenant administration** instead of **Connectors and tokens**.
196-
197-
For more information about remote help, see [Use remote help](../remote-actions/remote-help.md).
198-
199-
<!-- ***********************************************-->
200-
20181
## Notices
20282

20383
[!INCLUDE [Intune notices](../includes/intune-notices.md)]

0 commit comments

Comments
 (0)