Skip to content

Commit 9336cdd

Browse files
committed
Merge branch 'main' of https://github.com/microsoftdocs/memdocs-pr into erikre-doc-14658462-ID
2 parents 8377a80 + 8eb0b84 commit 9336cdd

4 files changed

Lines changed: 48 additions & 2 deletions

File tree

memdocs/intune/enrollment/windows-enrollment-methods.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ There are two ways to get devices enrolled in Intune:
4949

5050
Users can self-enroll their Windows device by using any of these methods:
5151

52-
- [Bring your own device (BYOD)](../user-help/enroll-windows-10-device.md): Users enroll their personally owned devices by downloading and installing the **Company Portal App** This process:
52+
- [Bring your own device (BYOD)](../user-help/enroll-windows-10-device.md): Users enroll their personally owned devices by downloading and installing the **Company Portal App**. This process:
5353
- Registers the device with Azure Active Directory to gain access to corporate resource like email.
5454
- Enrolls the device in Intune as a personal owned device (BYOD).
5555

memdocs/intune/includes/intune-notices.md

Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,37 @@ ms.custom: include file
1111

1212
These notices provide important information that can help you prepare for future Intune changes and features.
1313

14+
### Plan for Change: New APP biometrics settings and authorization requirements for Android devices<!--9740832-->
15+
16+
Currently, our biometric settings do not distinguish between [Class 2 and Class 3 Biometrics](https://source.android.com/security/biometric). Expected with Intune’s July (2207) service release, we are modifying fingerprint and biometric settings for Intune app protection policies (APP) that apply to Android devices to accommodate [Class 3 Biometrics](https://developer.android.com/reference/android/hardware/biometrics/BiometricManager.Authenticators#BIOMETRIC_STRONG).
17+
18+
When you create or modify an app protection policy, you will see the following changes on the [Access requirements](/mem/intune/apps/app-protection-policy-settings-android#access-requirements) page:
19+
20+
- The setting **Fingerprint instead of PIN for access** will be rolled into the existing setting **Biometrics instead of PIN for access**. This setting will apply to all biometrics (Class 2 and Class 3).
21+
- The setting **Override fingerprint with PIN after timeout** will be modified to **Override Biometrics with PIN after timeout**. This setting will apply to all biometrics (Class 2 and Class 3).
22+
- There is a new setting: **Class 3 Biometrics (Android 9.0+)** with a new sub-setting: **Override Biometrics with PIN after biometric updates**. This sub-setting applies only to Class 3 Biometrics, when selected.
23+
24+
> [!NOTE]
25+
> Support for Class 3 Biometrics depends on the device, so you may need to contact your device manufacturers to understand device-specific limitations.
26+
27+
#### How does this affect you or your users?
28+
29+
Existing policies that allow fingerprints or biometrics for authentication will be migrated with no user impact.
30+
31+
After this change, if you configure the policy to require **Class 3 Biometrics (Android 9.0+)**, the following will occur:
32+
33+
- For users with Android devices that support Class 3 Biometrics, the user will be prompted to enter their APP PIN the first time they sign in to the APP-protected app. Subsequent sign-ins will use Class 3 Biometrics for authentication. However, if a user does not configure biometrics that satisfy the Class 3 requirements, they will be prompted to enter their PIN with each subsequent sign-in.
34+
- For users with Android devices that do not support Class 3 Biometrics, the user will be prompted to enter their PIN each time they sign in to the APP-protected app.
35+
36+
If **Override Biometrics with PIN after biometric updates** is also required, users who update their stored Class 3 Biometrics will be prompted to enter their APP PIN the next time they sign in to the APP-protected app.
37+
38+
#### How can you prepare?
39+
40+
Admins should be aware of the combined settings for fingerprints and Class 2 Biometrics. If your existing policy allows for fingerprint authentication but not other biometrics, it will allow for *both* once migrated. Also, if you had previously required an APP PIN after fingerprint timeout, this timeout setting will apply to all biometrics.
41+
42+
> [!NOTE]
43+
> If you are using the Microsoft Graph API’s FingerprintBlocked and BiometricAuthenticationBlocked, plan to update your APIs to use the new combined FingerprintAndBiometricEnabled API. The current APIs will retain their values for existing policies and the new FingerprintAndBiometricEnabled API will be defaulted to Null for these policies, until the policy has been updated.
44+
1445
### Plan for change: Intune is moving to support macOS 11.6 and higher later this year<!--14766663-->
1546

1647
Apple is expected to release macOS 13 (Ventura) later this year, Microsoft Intune, the Company Portal app and the Intune mobile device management agent will be moving to support macOS 11.6 (Big Sur) and later. Since the Company Portal app for iOS and macOS are a unified app, this change will occur shortly after the release of iOS/iPadOS 16.

memdocs/intune/protect/microsoft-tunnel-upgrade.md

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -144,6 +144,21 @@ After an update releases, it rolls out to tenants over the following days. This
144144

145145
The Microsoft Tunnel version for a server isn’t available in the Intune UI at this time. Instead, run the following command on the Linux server that hosts the tunnel to identify the hash values of *agentImageDigest* and *serverImageDiegest*: `cat /etc/mstunnel/images_configured`
146146

147+
### June 30, 2022
148+
149+
Image hash values:
150+
151+
- **agentImageDigest**: sha256:b42b8e158cebb91b6a69f2bdcedffde18a5f3f12cc502509c8aa9fea80f4daaa
152+
153+
- **serverImageDigest**: sha256:aa45b73bf143f1e440329853362cb4f300d9cc865d758534a94b983c8286ca4d
154+
155+
Changes in this release:
156+
- Minor bug fixes
157+
- Advanced setting improvements in Microsoft Tunnel configurations
158+
- Logging improvements
159+
- Additions in mstclit
160+
161+
147162
### April 27, 2022
148163

149164
Image hash values:

memdocs/intune/user-help/sign-in-to-the-company-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -116,7 +116,7 @@ If you normally use a smart card to access work resources, follow the steps in t
116116
The permissions described in this section apply to the Company Portal app for Android and devices running Android, versions 8.0 and later.
117117

118118
### Storage
119-
To share diagnostic in the app, you must allow Company Portal access to photos, media, and files on the device. The Intune Company Portal app never accesses photos, media, and files. The permission text is controlled by Google and can't be changed.
119+
To share diagnostics in the app, you must allow Company Portal access to photos, media, and files on the device. The Intune Company Portal app never accesses photos, media, and files. The permission text is controlled by Google and can't be changed.
120120

121121
If you approve access, your device can write its data logs to the device SD card. Approval enables logs to be moved via USB cable.
122122

0 commit comments

Comments
 (0)