You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: memdocs/intune/protect/software-updates-ios.md
+43-21Lines changed: 43 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,13 +1,13 @@
1
1
---
2
2
# required metadata
3
3
4
-
title: Configure iOS/iPadOS software update policies in Microsoft Intune
4
+
title: Use Microsoft Intune policies to manage iOS/iPadOS software updates
5
5
description: Use Microsoft Intune to manage system updates for supervised iOS/iPadOS devices.
6
6
keywords:
7
7
author: brenduns
8
8
ms.author: brenduns
9
9
manager: dougeby
10
-
ms.date: 03/23/2022
10
+
ms.date: 04/25/2022
11
11
ms.topic: how-to
12
12
ms.service: microsoft-intune
13
13
ms.subservice: protect
@@ -28,28 +28,33 @@ ms.collection:
28
28
- highpri
29
29
---
30
30
31
-
# Add iOS/iPadOS software update policies in Intune
31
+
# Manage iOS/iPadOS software update policies in Intune
32
32
33
-
Use Microsoft Intune device configuration profiles to manage software updates for iOS/iPad devices that enrolled as supervised devices. [Supervised devices](../enrollment/device-enrollment-program-enroll-ios.md#what-is-supervised-mode) are devices that enrolled using either Apple Business Manager or Apple School Manager.
33
+
You can use Microsoft Intune device configuration profiles to manage software updates for iOS/iPad devices that enrolled as supervised devices.
34
+
35
+
[Supervised devices](../enrollment/device-enrollment-program-enroll-ios.md#what-is-supervised-mode) are devices that enroll through one of Apple's [Automated Device Enrollment (ADE)](https://deploy.apple.com/) options. Devices enrolled through ADE support management control through a mobile device management solution like Intune. ADE options include Apple Business Manager or Apple School Manager.
34
36
35
37
This feature applies to:
36
38
37
39
- iOS 10.3 and later (supervised)
38
40
- iPadOS 13.0 and later (supervised)
39
41
40
-
When configuring a policy to deploy updates, you can:
42
+
With policies for iOS software updates, you can:
43
+
44
+
- Choose to deploy the *latest update* that's available, or choose to deploy an older update, based on the update version number.
45
+
46
+
When deploying an older update, you must also deploy a device restrictions profile to [restrict visibility of software updates](#delay-visibility-of-software-updates). This is because update profiles don't prevent users from updating the OS manually. Users can be prevented from updating the OS manually with a device configuration policy that restricts visibility of software updates.
41
47
42
-
- Choose to deploy the *latest update* that's available, or choose to deploy an older update, based on the update version number. If you choose to deploy an older update, you must also set a Device Configuration policy to restrict visibility of software updates.
43
48
- Specify a schedule that determines when the update installs. Schedules can be as simple as installing updates the next time that the device checks in, or creating date and time ranges during which updates can install or are blocked from installing.
44
49
45
-
By default, devices check in with Intune about every 8 hours. If an update is available through an update policy, the device downloads the update. The device then installs the update upon next check-in within your schedule configuration. Profiles don't prevent users from updating the OS manually. Users can be prevented from updating the OS manually with a Device Configuration policy to restrict visibility of software updates.
50
+
By default, devices check in with Intune about every 8 hours. If an update is available through an update policy, the device downloads the update. The device then installs the update upon next check-in within your schedule configuration.
46
51
47
52
> [!NOTE]
48
53
> iOS/iPadOS software updates that you send to a [Shared iPad](../enrollment/device-enrollment-shared-ipad.md), can install only when there is no user signed in to a Shared iPad session and the device is charging. The iPad must be signed out of all user accounts and plugged into a power source for the device to update successfully.
49
54
50
55
> [!NOTE]
51
-
> If using [Autonomous Single App Mode (ASAM)](../configuration/device-restrictions-ios.md#autonomous-single-app-mode-asam), the impact of OS updates should be considered as the resulting behaviour may be undesirable.
52
-
Consider testing to assess the impact of OS updates on the app you are running in ASAM.
56
+
> If using [Autonomous Single App Mode (ASAM)](../configuration/device-restrictions-ios.md#autonomous-single-app-mode-asam), the impact of OS updates should be considered as the resulting behavior may be undesirable.
57
+
Consider testing to assess the impact of OS updates on the app you are running in ASAM. ASAM can be configured through Intune [device restriction profiles](../configuration/device-restrictions-ios.md#general).
53
58
54
59
## Configure the policy
55
60
@@ -64,11 +69,11 @@ Consider testing to assess the impact of OS updates on the app you are running i
64
69
1.**Select version to install**. You can choose from:
65
70
66
71
-*Latest update*: Deploys the most recently released update for iOS/iPadOS.
67
-
- Any previous version that is available in the dropdown box. If you select a previous version, you must also deploy a device configuration policy to delay visibility of software updates.
72
+
- Any previous version that is available in the dropdown box. If you select a previous version, you must also deploy a device configuration policy to [delay visibility](#delay-visibility-of-software-updates) of software updates.
68
73
69
74
2.**Schedule type**: Configure the schedule for this policy:
70
75
71
-
-*Update at next check-in*: The update installs on the device the next time it checks in with Intune. This is the simplest option and has no additional configurations.
76
+
-*Update at next check-in*: The update installs on the device the next time it checks in with Intune. This option is the simplest and has no extra configurations.
72
77
-*Update during scheduled time*: You configure one or more windows of time during which the update will install upon check-in.
73
78
-*Update outside of scheduled time*: You configure one or more windows of time during which the updates won't install upon check-in.
74
79
@@ -77,25 +82,25 @@ Consider testing to assess the impact of OS updates on the app you are running i
77
82
:::image type="content" source="./media/software-updates-ios/scheduled-time.png" alt-text="Example of selecting an update during scheduled time.":::
78
83
79
84
-**Time zone**: Choose a time zone.
80
-
-**Time window**: Define one or more blocks of time that restrict when the updates install. The effect of the following options depends on the Schedule type you selected. By using a start day and end day, overnight blocks are supported. Options include:
85
+
-**Time window**: Define one or more blocks of time that restrict when the updates install. The effect of the following options depends on the Schedule type you selected. With a start day and end day, overnight blocks are supported. Options include:
81
86
82
87
-**Start day**: Choose the day on which the schedule window starts.
83
88
-**Start time**: Choose the time day when the schedule window begins. For example, if you select 5 AM and have a Schedule type of *Update during scheduled time*, 5 AM will be the time that updates can begin to install. If you chose a Schedule type of *Update outside of a scheduled time*, 5 AM will be the start of a period of time that updates can't install.
84
89
-**End day**: Choose the day on which the schedule window ends.
85
-
-**End time**: Choose the time of day when the schedule window stops. For example, if you select 1 AM and have a Schedule type of *Update during scheduled time*, 1 AM will be the time that updates can no longer install. If you chose a Schedule type of *Update outside of a scheduled time*, 1 AM will be the start of a period of time that updates can install.
90
+
-**End time**: Choose the time of day when the schedule window stops. For example, if you select 1 AM and have a Schedule type of *Update during scheduled time*, 1 AM will be the time when updates can no longer install. If you chose a Schedule type of *Update outside of a scheduled time*, 1 AM will be the start of a period of time that updates can install.
86
91
87
92
If you don't configure times to start or end, the configuration results in no restriction and updates can install at any time.
88
93
89
94
> [!NOTE]
90
-
> You can configure settings in [Device Restrictions](../configuration/device-restrictions-ios.md#general) to hide an update from device users for a period of time on your supervised iOS/iPadOS devices. A restriction period can give you time to test an update before it's visible to users to install. After the device restriction period expires, the update becomes visible to users. Users can then choose to install it, or your Software update policies might automatically install it soon after.
95
+
> You can configure settings in a [device restrictions](#delay-visibility-of-software-updates) profile to hide an update from device users for a period of time on your supervised iOS/iPadOS devices. A restriction period can give you time to test an update before it's visible to users to install. After the device restriction period expires, the update becomes visible to users. Users can then choose to install it, or your Software update policies might automatically install it soon after.
91
96
>
92
-
> When you use a device restriction to hide an update, review your software update policies to ensure they wont schedule the install of the update before that restriction period ends. Software update policies install updates based on their own schedule, regardless of the update being hidden or visible to the device user.
97
+
> When you use a device restriction to hide an update, review your software update policies to ensure they won't schedule the installation of the update before that restriction period ends. Software update policies install updates based on their own schedule, regardless of the update being hidden or visible to the device user.
93
98
94
99
After configuring *Update policy settings*, select **Next**.
95
100
96
101
5. On the **Scope tags** tab, select **+ Select scope tags** to open the *Select tags* pane if you want to apply them to the update policy.
97
102
98
-
- On the **Select tags** pane, choose one or more tags, and then click **Select** to add them to the policy and return to the *Scope tags* pane.
103
+
- On the **Select tags** pane, choose one or more tags, and then **Select** to add them to the policy and return to the *Scope tags* pane.
99
104
100
105
When ready, select **Next** to continue to *Assignments*.
101
106
@@ -105,8 +110,6 @@ Consider testing to assess the impact of OS updates on the app you are running i
105
110
106
111
7. On the **Review + create** tab, review the settings, and then select **Create** when ready to save your iOS/iPadOS update policy. Your new policy is displayed in the list of update policies for iOS/iPadOS.
107
112
108
-
For guidance from the Intune support team, see [Delay visibility of software updates in Intune for supervised devices](https://techcommunity.microsoft.com/t5/Intune-Customer-Success/Delaying-visibility-of-software-updates-in-Intune-for-supervised/ba-p/345753).
109
-
110
113
> [!NOTE]
111
114
> Apple MDM doesn't allow you to force a device to install updates by a certain time or date. You can't use Intune software update policies to downgrade the OS version on a device.
112
115
@@ -123,11 +126,30 @@ You can edit an existing policy, including changing the restricted times:
123
126
3. After introducing a change, select **Review + save** > **Save** to save your edits, and return to the policies *Properties*.
124
127
125
128
> [!NOTE]
126
-
> If the **Start time** and **End time** are both set to 12 AM, Intune does not check for restrictions on when to install updates. This means than any configurations you have for **Select times to prevent update installations** are ignored, and updates can install at any time.
129
+
> If the **Start time** and **End time** are both set to 12 AM, Intune does not check for restrictions on when to install updates. This means that any configurations you have for **Select times to prevent update installations** are ignored, and updates can install at any time.
130
+
131
+
132
+
## Delay visibility of software updates
133
+
134
+
When you use update policies for iOS, you might have need to delay visibility of an iOS software update. Reasons to delay visibility include:
135
+
136
+
- Prevent users from updating the OS manually
137
+
- To deploy an older update while preventing users from installing a more recent one
138
+
139
+
To delay visibility, deploy a device restriction template that configures the following settings:
140
+
141
+
-**Defer software updates** = **Yes**
142
+
This doesn't affect any scheduled updates. It represents days before software updates are visible to end users after release.
143
+
144
+
-**Delay default visibility of software updates** = **1** to **90**
145
+
90 days is the maximum delay that Apple supports.
146
+
147
+
[Device restriction](../configuration/device-restrictions-configure.md) templates are part of device configuration policies.
148
+
149
+
For guidance from the Intune support team, see [Delay visibility of software updates in Intune for supervised devices](https://techcommunity.microsoft.com/t5/Intune-Customer-Success/Delaying-visibility-of-software-updates-in-Intune-for-supervised/ba-p/345753).
127
150
128
-
## Monitor device installation failures
151
+
## Monitor for update installation failures on devices
129
152
130
-
<!-- 1352223 -->
131
153
In the Microsoft Endpoint Manager admin center, go to **Devices** > **Monitor** > **Installation failures for iOS devices**.
132
154
133
155
Intune displays a list of supervised iOS/iPadOS devices that are targeted by an update policy. The list doesn't include devices that are up-to-date and healthy because iOS/iPad devices only return information about installation failures.
0 commit comments