Skip to content

Commit a3a6ca5

Browse files
committed
KPI improvements
1 parent 44d1d8e commit a3a6ca5

1 file changed

Lines changed: 43 additions & 21 deletions

File tree

memdocs/intune/protect/software-updates-ios.md

Lines changed: 43 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
22
# required metadata
33

4-
title: Configure iOS/iPadOS software update policies in Microsoft Intune
4+
title: Use Microsoft Intune policies to manage iOS/iPadOS software updates
55
description: Use Microsoft Intune to manage system updates for supervised iOS/iPadOS devices.
66
keywords:
77
author: brenduns
88
ms.author: brenduns
99
manager: dougeby
10-
ms.date: 03/23/2022
10+
ms.date: 04/25/2022
1111
ms.topic: how-to
1212
ms.service: microsoft-intune
1313
ms.subservice: protect
@@ -28,28 +28,33 @@ ms.collection:
2828
- highpri
2929
---
3030

31-
# Add iOS/iPadOS software update policies in Intune
31+
# Manage iOS/iPadOS software update policies in Intune
3232

33-
Use Microsoft Intune device configuration profiles to manage software updates for iOS/iPad devices that enrolled as supervised devices. [Supervised devices](../enrollment/device-enrollment-program-enroll-ios.md#what-is-supervised-mode) are devices that enrolled using either Apple Business Manager or Apple School Manager.
33+
You can use Microsoft Intune device configuration profiles to manage software updates for iOS/iPad devices that enrolled as supervised devices.
34+
35+
[Supervised devices](../enrollment/device-enrollment-program-enroll-ios.md#what-is-supervised-mode) are devices that enroll through one of Apple's [Automated Device Enrollment (ADE)](https://deploy.apple.com/) options. Devices enrolled through ADE support management control through a mobile device management solution like Intune. ADE options include Apple Business Manager or Apple School Manager.
3436

3537
This feature applies to:
3638

3739
- iOS 10.3 and later (supervised)
3840
- iPadOS 13.0 and later (supervised)
3941

40-
When configuring a policy to deploy updates, you can:
42+
With policies for iOS software updates, you can:
43+
44+
- Choose to deploy the *latest update* that's available, or choose to deploy an older update, based on the update version number.
45+
46+
When deploying an older update, you must also deploy a device restrictions profile to [restrict visibility of software updates](#delay-visibility-of-software-updates). This is because update profiles don't prevent users from updating the OS manually. Users can be prevented from updating the OS manually with a device configuration policy that restricts visibility of software updates.
4147

42-
- Choose to deploy the *latest update* that's available, or choose to deploy an older update, based on the update version number. If you choose to deploy an older update, you must also set a Device Configuration policy to restrict visibility of software updates.
4348
- Specify a schedule that determines when the update installs. Schedules can be as simple as installing updates the next time that the device checks in, or creating date and time ranges during which updates can install or are blocked from installing.
4449

45-
By default, devices check in with Intune about every 8 hours. If an update is available through an update policy, the device downloads the update. The device then installs the update upon next check-in within your schedule configuration. Profiles don't prevent users from updating the OS manually. Users can be prevented from updating the OS manually with a Device Configuration policy to restrict visibility of software updates.
50+
By default, devices check in with Intune about every 8 hours. If an update is available through an update policy, the device downloads the update. The device then installs the update upon next check-in within your schedule configuration.
4651

4752
> [!NOTE]
4853
> iOS/iPadOS software updates that you send to a [Shared iPad](../enrollment/device-enrollment-shared-ipad.md), can install only when there is no user signed in to a Shared iPad session and the device is charging. The iPad must be signed out of all user accounts and plugged into a power source for the device to update successfully.
4954
5055
> [!NOTE]
51-
> If using [Autonomous Single App Mode (ASAM)](../configuration/device-restrictions-ios.md#autonomous-single-app-mode-asam), the impact of OS updates should be considered as the resulting behaviour may be undesirable.
52-
Consider testing to assess the impact of OS updates on the app you are running in ASAM.
56+
> If using [Autonomous Single App Mode (ASAM)](../configuration/device-restrictions-ios.md#autonomous-single-app-mode-asam), the impact of OS updates should be considered as the resulting behavior may be undesirable.
57+
Consider testing to assess the impact of OS updates on the app you are running in ASAM. ASAM can be configured through Intune [device restriction profiles](../configuration/device-restrictions-ios.md#general).
5358

5459
## Configure the policy
5560

@@ -64,11 +69,11 @@ Consider testing to assess the impact of OS updates on the app you are running i
6469
1. **Select version to install**. You can choose from:
6570

6671
- *Latest update*: Deploys the most recently released update for iOS/iPadOS.
67-
- Any previous version that is available in the dropdown box. If you select a previous version, you must also deploy a device configuration policy to delay visibility of software updates.
72+
- Any previous version that is available in the dropdown box. If you select a previous version, you must also deploy a device configuration policy to [delay visibility](#delay-visibility-of-software-updates) of software updates.
6873

6974
2. **Schedule type**: Configure the schedule for this policy:
7075

71-
- *Update at next check-in*: The update installs on the device the next time it checks in with Intune. This is the simplest option and has no additional configurations.
76+
- *Update at next check-in*: The update installs on the device the next time it checks in with Intune. This option is the simplest and has no extra configurations.
7277
- *Update during scheduled time*: You configure one or more windows of time during which the update will install upon check-in.
7378
- *Update outside of scheduled time*: You configure one or more windows of time during which the updates won't install upon check-in.
7479

@@ -77,25 +82,25 @@ Consider testing to assess the impact of OS updates on the app you are running i
7782
:::image type="content" source="./media/software-updates-ios/scheduled-time.png" alt-text="Example of selecting an update during scheduled time.":::
7883

7984
- **Time zone**: Choose a time zone.
80-
- **Time window**: Define one or more blocks of time that restrict when the updates install. The effect of the following options depends on the Schedule type you selected. By using a start day and end day, overnight blocks are supported. Options include:
85+
- **Time window**: Define one or more blocks of time that restrict when the updates install. The effect of the following options depends on the Schedule type you selected. With a start day and end day, overnight blocks are supported. Options include:
8186

8287
- **Start day**: Choose the day on which the schedule window starts.
8388
- **Start time**: Choose the time day when the schedule window begins. For example, if you select 5 AM and have a Schedule type of *Update during scheduled time*, 5 AM will be the time that updates can begin to install. If you chose a Schedule type of *Update outside of a scheduled time*, 5 AM will be the start of a period of time that updates can't install.
8489
- **End day**: Choose the day on which the schedule window ends.
85-
- **End time**: Choose the time of day when the schedule window stops. For example, if you select 1 AM and have a Schedule type of *Update during scheduled time*, 1 AM will be the time that updates can no longer install. If you chose a Schedule type of *Update outside of a scheduled time*, 1 AM will be the start of a period of time that updates can install.
90+
- **End time**: Choose the time of day when the schedule window stops. For example, if you select 1 AM and have a Schedule type of *Update during scheduled time*, 1 AM will be the time when updates can no longer install. If you chose a Schedule type of *Update outside of a scheduled time*, 1 AM will be the start of a period of time that updates can install.
8691

8792
If you don't configure times to start or end, the configuration results in no restriction and updates can install at any time.
8893

8994
> [!NOTE]
90-
> You can configure settings in [Device Restrictions](../configuration/device-restrictions-ios.md#general) to hide an update from device users for a period of time on your supervised iOS/iPadOS devices. A restriction period can give you time to test an update before it's visible to users to install. After the device restriction period expires, the update becomes visible to users. Users can then choose to install it, or your Software update policies might automatically install it soon after.
95+
> You can configure settings in a [device restrictions](#delay-visibility-of-software-updates) profile to hide an update from device users for a period of time on your supervised iOS/iPadOS devices. A restriction period can give you time to test an update before it's visible to users to install. After the device restriction period expires, the update becomes visible to users. Users can then choose to install it, or your Software update policies might automatically install it soon after.
9196
>
92-
> When you use a device restriction to hide an update, review your software update policies to ensure they wont schedule the install of the update before that restriction period ends. Software update policies install updates based on their own schedule, regardless of the update being hidden or visible to the device user.
97+
> When you use a device restriction to hide an update, review your software update policies to ensure they won't schedule the installation of the update before that restriction period ends. Software update policies install updates based on their own schedule, regardless of the update being hidden or visible to the device user.
9398
9499
After configuring *Update policy settings*, select **Next**.
95100

96101
5. On the **Scope tags** tab, select **+ Select scope tags** to open the *Select tags* pane if you want to apply them to the update policy.
97102

98-
- On the **Select tags** pane, choose one or more tags, and then click **Select** to add them to the policy and return to the *Scope tags* pane.
103+
- On the **Select tags** pane, choose one or more tags, and then **Select** to add them to the policy and return to the *Scope tags* pane.
99104

100105
When ready, select **Next** to continue to *Assignments*.
101106

@@ -105,8 +110,6 @@ Consider testing to assess the impact of OS updates on the app you are running i
105110

106111
7. On the **Review + create** tab, review the settings, and then select **Create** when ready to save your iOS/iPadOS update policy. Your new policy is displayed in the list of update policies for iOS/iPadOS.
107112

108-
For guidance from the Intune support team, see [Delay visibility of software updates in Intune for supervised devices](https://techcommunity.microsoft.com/t5/Intune-Customer-Success/Delaying-visibility-of-software-updates-in-Intune-for-supervised/ba-p/345753).
109-
110113
> [!NOTE]
111114
> Apple MDM doesn't allow you to force a device to install updates by a certain time or date. You can't use Intune software update policies to downgrade the OS version on a device.
112115
@@ -123,11 +126,30 @@ You can edit an existing policy, including changing the restricted times:
123126
3. After introducing a change, select **Review + save** > **Save** to save your edits, and return to the policies *Properties*.
124127

125128
> [!NOTE]
126-
> If the **Start time** and **End time** are both set to 12 AM, Intune does not check for restrictions on when to install updates. This means than any configurations you have for **Select times to prevent update installations** are ignored, and updates can install at any time.
129+
> If the **Start time** and **End time** are both set to 12 AM, Intune does not check for restrictions on when to install updates. This means that any configurations you have for **Select times to prevent update installations** are ignored, and updates can install at any time.
130+
131+
132+
## Delay visibility of software updates
133+
134+
When you use update policies for iOS, you might have need to delay visibility of an iOS software update. Reasons to delay visibility include:
135+
136+
- Prevent users from updating the OS manually
137+
- To deploy an older update while preventing users from installing a more recent one
138+
139+
To delay visibility, deploy a device restriction template that configures the following settings:
140+
141+
- **Defer software updates** = **Yes**
142+
This doesn't affect any scheduled updates. It represents days before software updates are visible to end users after release.
143+
144+
- **Delay default visibility of software updates** = **1** to **90**
145+
90 days is the maximum delay that Apple supports.
146+
147+
[Device restriction](../configuration/device-restrictions-configure.md) templates are part of device configuration policies.
148+
149+
For guidance from the Intune support team, see [Delay visibility of software updates in Intune for supervised devices](https://techcommunity.microsoft.com/t5/Intune-Customer-Success/Delaying-visibility-of-software-updates-in-Intune-for-supervised/ba-p/345753).
127150

128-
## Monitor device installation failures
151+
## Monitor for update installation failures on devices
129152

130-
<!-- 1352223 -->
131153
In the Microsoft Endpoint Manager admin center, go to **Devices** > **Monitor** > **Installation failures for iOS devices**.
132154

133155
Intune displays a list of supervised iOS/iPadOS devices that are targeted by an update policy. The list doesn't include devices that are up-to-date and healthy because iOS/iPad devices only return information about installation failures.

0 commit comments

Comments
 (0)