You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
### Global quiet time app policy settings<!-- 15424417 -->
70
+
The global quiet time settings will allow you to create policies to schedule quiet time for your end users which will automatically mute Microsoft Outlook email and Teams notifications on iOS/iPadOS and Android platforms. These policies can be used to limit end user notifications received after work hours. When this feature is available, you will be able to find it in [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) by selecting **Apps** > **Quiet Time** > **Policies**.
71
+
72
+
### Select default work apps in Intune Company Portal<!-- 14531482 -->
73
+
Android device users will be able to select and save their preferred work apps in Intune Company Portal. They'll be able to select the default apps they want to use for a specific intent or file type, and change or remove their preferences. Company Portal will securely store the device user's preferred defaults. This feature is an enhancement to the Android MAM custom app picker, which is a part of the Android MAM SDK.
74
+
75
+
### Use filters with app configuration profiles for managed devices<!-- 7423842 -->
76
+
You will be able to use filters to refine the assignment scope when deploying app configuration profiles for managed devices.
77
+
You can first create a filter using any of the available properties for iOS and Android. Then, in [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) you can assign your managed app configuration profile by selecting **Apps** > **App configuration policies** > **Add** > **Managed devices** and go to the assignment page. After selecting a group, you can refine the applicability of the policy by choosing a filter and deciding to use it in **Include** or **Exclude** mode. For related information about filters, see [Use filters when assigning your apps, policies, and profiles in Microsoft Endpoint Manager](../fundamentals/filters.md).
78
+
67
79
## Device management
68
80
81
+
### Intune support for Linux Ubuntu LTS desktops will be generally available<!-- 14616038 -->
82
+
Intune will support Linux Ubuntu LTS desktops. The following initial functionality is planned for this first release for Linux desktop management:
83
+
- Enroll Linux Ubuntu LTS (22.04 and 20.04) desktops into Microsoft Endpoint Manager
84
+
- Enable access to corporate resources via Microsoft Edge
85
+
- Conditional Access enforcement in Microsoft Edge
86
+
- Standard Compliance policies
87
+
- Linux distribution
88
+
- Device encryption
89
+
- Password complexity
90
+
- Bash script support for custom compliance policies
91
+
92
+
### New hardware details available for individual devices running on iOS/iPadOS<!-- 15038076 -->
93
+
Select **Devices** > **All devices** > *select one of your listed devices* and open it's **Hardware** details. The following new details are available in the **Hardware** pane of individual devices:
94
+
95
+
-**Battery level**: Shows the battery level of the device anywhere between 0 and 100, or defaults to null if the battery level cannot be determined. This is available for devices running iOS/iPadOS 5.0 and later.
96
+
-**Resident users**: Shows the number of users currently on the shared iPad device, or defaults to null if the number of users cannot be determined. This is available for devices running iOS/iPadOS 13.4 and later.
97
+
98
+
For more information, see [View device details with Microsoft Intune](../remote-actions/device-inventory.md).
99
+
100
+
Applies to:
101
+
- iOS/iPadOS
102
+
103
+
### Endpoint security firewall rules support for ICMP type<!-- 5653356 -->
104
+
We’re adding a new setting named **IcmpTypesAndCodes** to the endpoint security firewall rules template for Windows 10. To configure this in the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) by selecting **Endpoint security** > **Firewall** > **Create Policy** > Platform: *Windows 10, Windows 11, and Windows Server* > Profile: *Microsoft Defender Firewall Rules*).
105
+
106
+
With this new setting you’ll be able to configure inbound and outbound rules for [Internet Control Message Protocol](/windows/security/threat-protection/windows-firewall/create-an-inbound-icmp-rule) (ICMP) as part of a firewall rule.
107
+
108
+
Applies to:
109
+
- Windows 10, Windows 11, and Windows Server
110
+
69
111
### Support for Locate device on Android Enterprise corporate owned fully managed and Android Enterprise corporate owned work profile devices<!-- 12391424 -->
70
112
You'll be able to use "Locate device" on Android Enterprise corporate owned fully managed and Android Enterprise corporate owned work profile devices. Using this feature, admins will be able to locate lost or stolen corporate devices on-demand. To do this, in [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Devices**, and then select **All devices**. From the list of devices you manage, select a supported device, and choose the **Locate device** remote action.
71
113
@@ -81,13 +123,68 @@ Applies to:
81
123
82
124
## Device enrollment
83
125
126
+
### iOS/iPadOS Setup Assistant with modern authentication supports Just in Time Registration (public preview)<!-- 15515188 -->
127
+
Intune will support Just in Time Registration for iOS/iPadOS enrollment scenarios that use Setup Assistant with modern authentication. Just in Time Registration reduces the number of authentication prompts shown to users throughout the provisioning experience, giving them a more seamless onboarding experience. It eliminates the need to have the Company Portal app for Azure AD registration and compliance checks, while automatically establishing SSO across the device. Just In Time Registration will be available in public preview for devices enrolling through Apple Automated Device Enrollment and running iOS/iPadOS 13.0 or later.
128
+
84
129
### Windows Autopilot diagnostics will capture ESP failures<!-- 1895390 -->
85
130
Windows Autopilot diagnostics will automatically capture diagnostics about Windows Autopilot failures that occur on the Enrollment Status Page (ESP). Diagnostics will be available to download in the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
### New settings for Device Firmware Configuration Interface (DFCI) profiles on Windows devices<!-- 15511597 -->
137
+
You can create a DFCI profile that enables the Windows OS to pass management commands from Intune to UEFI (Unified Extensible Firmware Interface) (**Devices** > **Configuration profiles** > **Create profile** > **Windows 10 and later** for platform > **Templates > Device Firmware Configuration Interface**).
138
+
139
+
You can use this feature to control BIOS settings. There will be new settings you can configure in the DFCI policy:
140
+
141
+
- Cameras:
142
+
- Front camera
143
+
- Infrared camera
144
+
- Rear camera
145
+
146
+
- Radios:
147
+
- WWAN
148
+
- NFC
149
+
150
+
- Ports
151
+
- SD Card
152
+
153
+
For more information on DFCI profiles, go to [Use Device Firmware Configuration Interface (DFCI) profiles on Windows devices in Microsoft Intune](../configuration/device-firmware-configuration-interface-windows.md) and [DFCI profile settings list](../configuration/device-firmware-configuration-interface-windows-settings.md).
154
+
155
+
Applies to:
156
+
- Windows 11 on supported UEFI
157
+
- Windows 10 RS5 (1809) and later on supported UEFI
158
+
159
+
### New settings available in the iOS/iPadOS and macOS Settings Catalog<!-- 15514929 -->
160
+
The [Settings Catalog](../configuration/settings-catalog.md) lists all the settings you can configure in a device policy, and all in one place.
161
+
162
+
New settings are available in the Settings Catalog. In the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), you can see these settings at **Devices** > **Configuration profiles** > **Create profile** > **iOS/iPadOS** or **macOS** for platform > **Settings catalog** for profile type.
163
+
164
+
New settings include:
165
+
166
+
**Networking > Cellular**:
167
+
- Enable XLAT464
168
+
169
+
Applies to:
170
+
- iOS/iPadOS
171
+
172
+
**Privacy > Privacy Preferences Policy Control**:
173
+
- System Policy App Bundles
174
+
175
+
Applies to:
176
+
- macOS
177
+
178
+
**Restrictions**:
179
+
- Allow Rapid Security Response Installation
180
+
- Allow Rapid Security Response Removal
181
+
182
+
Applies to:
183
+
- iOS/iPadOS
184
+
- macOS
185
+
186
+
For more information about configuring Settings Catalog profiles in Intune, see [Create a policy using settings catalog](../configuration/settings-catalog.md).
187
+
91
188
### Filter app and group policy assignments using Windows 11 SE operating system SKUs<!-- 10588651 -->
92
189
When you assign an app or policy, you can filter the assignment using different device properties, such as device manufacturer, operating system SKU, and more.
93
190
@@ -131,6 +228,55 @@ Applies to:
131
228
132
229
## Device security
133
230
231
+
### Grant apps permission on Android Enterprise devices<!-- 12441244 -->
232
+
For Android Enterprise devices, you’ll soon be able to configure certificate profiles to silently grant specific apps access to use the certificate. This expands on the current behavior where a device user must approve the use of a certificate by an application.
233
+
234
+
You’ll be able to choose to grant certificate access silently to specific apps or to require user approval. When configured for specific apps, you’ll then select which apps have this access as part of the profile, while all other apps will continue to require user approval before being able to use the certificate.
235
+
236
+
This support will be added to profiles for SCEP, PKCS, PKCS imported, and Derived Credential certificate profiles.
237
+
238
+
Applies to:
239
+
- Android Enterprise devices that enroll as Fully Managed, Dedicated, and Corporate-Owned work Profile.
240
+
241
+
### Attack surface reduction rule exclusions on a per-rule basis<!-- 13385644 -->
242
+
Attack surface reduction rules provide valuable controls for protecting your devices. Currently, exclusions are only supported for all of the rules that are enabled on the device.
243
+
244
+
With Intune, you’ll soon be able to configure exclusions for your [attack surface reduction rules](../protect/endpoint-security-asr-policy.md) on a per-rule basis. This will allow you to define exclusions for individual rules versus an exclusion that applies to all of the attack surface reduction rules on a device.
245
+
246
+
Applies to:
247
+
- Windows 10/11
248
+
249
+
### Manage macOS software updates with Intune<!-- 9801186 -->
250
+
You’ll soon be able to use Intune policies to manage macOS software updates for devices that enrolled using Automated Device Enrollment (ADE). The policy will be available in the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) at **Devices** > **macOS** > **Update policies for macOS**.
251
+
252
+
Supported update types will include:
253
+
- Critical updates
254
+
- Firmware updates
255
+
- Configuration file updates
256
+
- All other updates (OS, built-in apps)
257
+
258
+
In addition to scheduling when a device updates, you’ll be able to manage behaviors like the following:
259
+
- Download and install: Download or install the update, depending on the current state.
260
+
- Download only: Download the software update without installing it.
261
+
- Install immediately: Download the software update and trigger the restart countdown notification.
262
+
- Notify only: Download the software update and notify the user through the App Store.
263
+
- Install later: Download the software update and install it at a later time.
264
+
- Not configured: No action taken on the software update.
265
+
266
+
For information from Apple about managing macOS software updates, see [Manage software updates for Apple devices - Apple Support](https://support.apple.com/guide/deployment/manage-software-updates-depc4c80847a/web) in the Apple's Platform Deployment documentation.
267
+
Apple maintains a list of security updates at [Apple security updates - Apple Support](https://support.apple.com/en-us/HT201222).
268
+
269
+
### Reusable groups of settings for removable storage in Device Control profiles<!-- 7351534 -->
270
+
You’ll soon be able to add reusable groups of settings to your profiles for device control profiles in your attack surface reduction policies. To configure device control profiles, go to [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) by selecting **Endpoint security** >**Attack surface reduction** > **Create Policy** > Platform: *Windows 10 and later* > Profile: *Device Control*.
271
+
272
+
The reusable groups for device control profiles will include a collection of settings that support managing *read*, *write*, and *execute* access for removable storage. Examples of common scenarios include:
273
+
- Prevent write and execute access to all but allow specific approved USBs
274
+
- Audit write and execute access to all but block specific unapproved USBs
275
+
- Only allow specific user groups to access specific removable storage on a shared PC
276
+
277
+
Applies to:
278
+
- Windows 10 or later
279
+
134
280
### Reusable groups of settings for Microsoft Defender Firewall Rules<!-- 5653346, 6009541 -->
135
281
You’ll soon be able to add reusable groups of settings to your profiles for Microsoft Defender Firewall Rules. The reusable groups are collections of remote IP addresses and FQDNs that you define one time and can then use with one or more firewall rule profiles. You’ll no longer need to reconfigure the same group of IP addresses in each individual profile that might require them.
0 commit comments