You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
### Global quiet time app policy settings<!-- 15424417 -->
70
+
The global quiet time settings will allow you to create policies to schedule quiet time for your end users which will automatically mute Microsoft Outlook email and Teams notifications on iOS/iPadOS and Android platforms. These policies can be used to limit end user notifications received after work hours. When this feature is available, you will be able to find it in [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) by selecting **Apps** > **Quiet Time** > **Policies**.
71
+
72
+
### Select default work apps in Intune Company Portal<!-- 14531482 -->
73
+
Android device users will be able to select and save their preferred work apps in Intune Company Portal. They'll be able to select the default apps they want to use for a specific intent or file type, and change or remove their preferences. Company Portal will securely store the device user's preferred defaults. This feature is an enhancement to the Android MAM custom app picker, which is a part of the Android MAM SDK.
74
+
67
75
## Device management
68
76
77
+
### Linux Ubuntu LTS desktops support<!-- 14616038 -->
78
+
Intune will support Linux Ubuntu LTS desktops. The following initial functionality is planned for this first release for Linux desktop management:
79
+
- Enroll Linux Ubuntu LTS (22.04 and 20.04) desktops into Microsoft Endpoint Manager
80
+
- Enable access to corporate resources via Microsoft Edge
81
+
- Conditional Access enforcement in Microsoft Edge
82
+
- Standard Compliance policies
83
+
- Linux distribution
84
+
- Device encryption
85
+
- Password complexity
86
+
- Bash script support for custom compliance policies
87
+
88
+
### Connect Chrome OS devices in Intune (public preview)<!-- 14273312 -->
89
+
We're introducing the ability to view devices that run on Chrome OS in the Microsoft Endpoint Manager admin center. With the public preview, you will be able connect your Google Workspace Admin console with Microsoft Intune. Device information about your Chrome OS endpoints will be synced into Intune and viewable in your device inventory list. Basic remote actions, such as restart, wipe, and lost mode will also be available in the admin center.
90
+
91
+
### New hardware details available for individual devices running on iOS/iPadOS<!-- 15038076 -->
92
+
Select **Devices** > **All devices** > *select one of your listed devices* and open it's **Hardware** details. The following new details are available in the **Hardware** pane of individual devices:
93
+
94
+
-**Battery level**: Shows the battery level of the device anywhere between 0 and 100, or defaults to null if the battery level cannot be determined. This is available for devices running iOS/iPadOS 5.0 and later.
95
+
-**Resident users**: Shows the number of users currently on the shared iPad device, or defaults to null if the number of users cannot be determined. This is available for devices running iOS/iPadOS 13.4 and later.
96
+
97
+
For more information, see [View device details with Microsoft Intune](../remote-actions/device-inventory.md).
98
+
99
+
Applies to:
100
+
- iOS/iPadOS
101
+
102
+
### Endpoint security firewall rules support for ICMP type<!-- 5653356 -->
103
+
We’re adding a new setting named **IcmpTypesAndCodes** to the endpoint security firewall rules template for Windows 10. To configure this in the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) by selecting **Endpoint security** > **Firewall** > **Create Policy** > Platform: *Windows 10, Windows 11, and Windows Server* > Profile: *Microsoft Defender Firewall Rules*).
104
+
105
+
With this new setting you’ll be able to configure inbound and outbound rules for [Internet Control Message Protocol](/windows/security/threat-protection/windows-firewall/create-an-inbound-icmp-rule) (ICMP) as part of a firewall rule.
106
+
107
+
Applies to:
108
+
- Windows 10, Windows 11, and Windows Server
109
+
69
110
### Support for Locate device on Android Enterprise corporate owned fully managed and Android Enterprise corporate owned work profile devices<!-- 12391424 -->
70
111
You'll be able to use "Locate device" on Android Enterprise corporate owned fully managed and Android Enterprise corporate owned work profile devices. Using this feature, admins will be able to locate lost or stolen corporate devices on-demand. To do this, in [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Devices**, and then select **All devices**. From the list of devices you manage, select a supported device, and choose the **Locate device** remote action.
71
112
@@ -81,13 +122,45 @@ Applies to:
81
122
82
123
## Device enrollment
83
124
125
+
### iOS/iPadOS Setup Assistant with modern authentication supports Just in Time Registration (public preview)<!-- 15515188 -->
126
+
Intune will support Just in Time Registration for iOS/iPadOS enrollment scenarios that use Setup Assistant with modern authentication. Just in Time Registration reduces the number of authentication prompts shown to users throughout the provisioning experience, giving them a more seamless onboarding experience. It eliminates the need to have the Company Portal app for Azure AD registration and compliance checks, while automatically establishing SSO across the device. Just In Time Registration will be available in public preview for devices enrolling through Apple Automated Device Enrollment and running iOS/iPadOS 13.0 or later.
127
+
84
128
### Windows Autopilot diagnostics will capture ESP failures<!-- 1895390 -->
85
129
Windows Autopilot diagnostics will automatically capture diagnostics about Windows Autopilot failures that occur on the Enrollment Status Page (ESP). Diagnostics will be available to download in the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
### New settings available in the iOS/iPadOS and macOS Settings Catalog<!-- 15514929 -->
136
+
The [Settings Catalog](../configuration/settings-catalog.md) lists all the settings you can configure in a device policy, and all in one place.
137
+
138
+
New settings are available in the Settings Catalog. In the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), you can see these settings at **Devices** > **Configuration profiles** > **Create profile** > **iOS/iPadOS** or **macOS** for platform > **Settings catalog** for profile type.
139
+
140
+
New settings include:
141
+
142
+
**Networking > Cellular**:
143
+
- Enable XLAT464
144
+
145
+
Applies to:
146
+
- iOS/iPadOS
147
+
148
+
**Privacy > Privacy Preferences Policy Control**:
149
+
- System Policy App Bundles
150
+
151
+
Applies to:
152
+
- macOS
153
+
154
+
**Restrictions**:
155
+
- Allow Rapid Security Response Installation
156
+
- Allow Rapid Security Response Removal
157
+
158
+
Applies to:
159
+
- iOS/iPadOS
160
+
- macOS
161
+
162
+
For more information about configuring Settings Catalog profiles in Intune, see [Create a policy using settings catalog](../configuration/settings-catalog.md).
163
+
91
164
### Filter app and group policy assignments using Windows 11 SE operating system SKUs<!-- 10588651 -->
92
165
When you assign an app or policy, you can filter the assignment using different device properties, such as device manufacturer, operating system SKU, and more.
93
166
@@ -131,6 +204,45 @@ Applies to:
131
204
132
205
## Device security
133
206
207
+
### Attack surface reduction rule exclusions on a per-rule basis<!-- 13385644 -->
208
+
Attack surface reduction rules provide valuable controls for protecting your devices. Currently, exclusions are only supported for all of the rules that are enabled on the device.
209
+
210
+
With Intune, you’ll soon be able to configure exclusions for your [attack surface reduction rules](../protect/endpoint-security-asr-policy.md) on a per-rule basis. This will allow you to define exclusions for individual rules versus an exclusion that applies to all of the attack surface reduction rules on a device.
211
+
212
+
Applies to:
213
+
- Windows 10/11
214
+
215
+
### Manage macOS software updates with Intune<!-- 9801186 -->
216
+
You’ll soon be able to use Intune policies to manage macOS software updates for devices that enrolled using Automated Device Enrollment (ADE). The policy will be available in the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) at **Devices** > **macOS** > **Update policies for macOS**.
217
+
218
+
Supported update types will include:
219
+
- Critical updates
220
+
- Firmware updates
221
+
- Configuration file updates
222
+
- All other updates (OS, built-in apps)
223
+
224
+
In addition to scheduling when a device updates, you’ll be able to manage behaviors like the following:
225
+
- Download and install: Download or install the update, depending on the current state.
226
+
- Download only: Download the software update without installing it.
227
+
- Install immediately: Download the software update and trigger the restart countdown notification.
228
+
- Notify only: Download the software update and notify the user through the App Store.
229
+
- Install later: Download the software update and install it at a later time.
230
+
- Not configured: No action taken on the software update.
231
+
232
+
For information from Apple about managing macOS software updates, see [Manage software updates for Apple devices - Apple Support](https://support.apple.com/guide/deployment/manage-software-updates-depc4c80847a/web) in the Apple's Platform Deployment documentation.
233
+
Apple maintains a list of security updates at [Apple security updates - Apple Support](https://support.apple.com/en-us/HT201222).
234
+
235
+
### Reusable groups of settings for removable storage in Device Control profiles<!-- 7351534 -->
236
+
You’ll soon be able to add reusable groups of settings to your profiles for device control profiles in your attack surface reduction policies. To configure device control profiles, go to [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) by selecting **Endpoint security** >**Attack surface reduction** > **Create Policy** > Platform: *Windows 10 and later* > Profile: *Device Control*.
237
+
238
+
The reusable groups for device control profiles will include a collection of settings that support managing *read*, *write*, and *execute* access for removable storage. Examples of common scenarios include:
239
+
- Prevent write and execute access to all but allow specific approved USBs
240
+
- Audit write and execute access to all but block specific unapproved USBs
241
+
- Only allow specific user groups to access specific removable storage on a shared PC
242
+
243
+
Applies to:
244
+
- Windows 10 or later
245
+
134
246
### Reusable groups of settings for Microsoft Defender Firewall Rules<!-- 5653346, 6009541 -->
135
247
You’ll soon be able to add reusable groups of settings to your profiles for Microsoft Defender Firewall Rules. The reusable groups are collections of remote IP addresses and FQDNs that you define one time and can then use with one or more firewall rule profiles. You’ll no longer need to reconfigure the same group of IP addresses in each individual profile that might require them.
0 commit comments