Skip to content

Commit b2330ad

Browse files
committed
Merge branch 'release-intune-2209' of https://github.com/microsoftdocs/memdocs-pr into erikre-wn2209-15468520
2 parents 831b169 + 550b339 commit b2330ad

13 files changed

Lines changed: 386 additions & 7 deletions
Lines changed: 77 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,77 @@
1+
---
2+
title: NTLM connection fallback update for Microsoft Endpoint Configuration Manager
3+
titleSuffix: Configuration Manager
4+
description: NTLM connection fallback update for Configuration Manager
5+
ms.date: 09/20/2022
6+
ms.prod: configuration-manager
7+
ms.technology: configmgr-core
8+
ms.topic: reference
9+
ms.assetid: 3c93a332-e818-46fe-860f-cbebf4dd9ab3
10+
author: bhuney
11+
ms.author: brianhun
12+
manager: dougeby
13+
---
14+
# NTLM connection fallback update for Microsoft Endpoint Configuration Manager
15+
16+
*Applies to: Configuration Manager (current branch, versions 2103, 2107, 2111, 2203, 2207)*
17+
18+
## Summary of KB15498768
19+
Disabling the **Allow connection fallback to NTLM** option in *Client Push Installation Properties* is not honored under either of the following conditions:
20+
- If there are Kerberos authentication failures the client push account will attempt an NTLM connection instead.
21+
- The site server computer account will attempt a connection using NTLM if Kerberos authentication fails for all defined client push installation accounts.
22+
23+
This update prevents any attempt at NTLM authentication for client push installation when the **Allow connection fallback to NTLM** option is disabled.
24+
25+
Installation of this update resolves the following security issue:
26+
- [CVE-2022-37972](https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-37972)
27+
28+
Beginning with Configuration Manager current branch, version 2207, the **Allow connection fallback to NTLM** option is *disabled* by default on new site installations.
29+
30+
It is recommended to disable this option in existing environments, where possible, to increase security.
31+
32+
Refer to the following documents for more detail on client and NTLM security:
33+
- [Security and privacy for Configuration Manager clients](../../core/clients/deploy/plan/security-and-privacy-for-clients.md#security-guidance-for-clients)
34+
- [KB5005413: Mitigating NTLM Relay Attacks on Active Directory Certificate Services](https://support.microsoft.com/topic/kb5005413-mitigating-ntlm-relay-attacks-on-active-directory-certificate-services-ad-cs-3612b773-4043-4aa9-b23d-b87910cd3429)
35+
- [Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers](https://learn.microsoft.com/windows/security/threat-protection/security-policy-settings/network-security-restrict-ntlm-outgoing-ntlm-traffic-to-remote-servers)
36+
37+
Environments using versions of Configuration Manager current branch prior to 2103 are encouraged to update to a later supported version. Administrators can also disable use of automatic and manual client push installation methods to remove the risk of exposure to this issue.
38+
For more information, see [Support for Configuration Manager current branch versions](../../core/servers/manage/current-branch-versions-supported.md).
39+
40+
## Update information for Microsoft Endpoint Configuration Manager, versions 2103-2207
41+
An update to resolve this issue is available in the **Updates and Servicing** node of the Configuration Manager console for environments that have versions 2103-2207 installed.
42+
43+
#### Update replacement information
44+
This update does not replace any previously released updates.
45+
46+
#### Restart information
47+
For Configuration Manager versions 2107 and later, this update does not require a computer restart or a [site reset](../../core/servers/manage/modify-your-infrastructure.md#bkmk_reset) after installation.
48+
49+
Configuration Manager version 2103 will require a site reset after update installation.
50+
51+
### Additional installation information
52+
After you install this update on a primary site, pre-existing secondary sites must be manually updated. To update a secondary site in the Configuration Manager console, select **Administration** > **Site Configuration** > **Sites** > **Recover Secondary Site**, and then select the secondary site. The primary site then reinstalls that secondary site by using the updated files. Configurations and settings for the secondary site are not affected by this reinstallation. The new, upgraded, and reinstalled secondary sites under that primary site automatically receive this update.
53+
54+
Run the following SQL Server command on the site database to check whether the update version of a secondary site matches that of its parent primary site:
55+
```sql
56+
select dbo.fnGetSecondarySiteCMUpdateStatus ('SiteCode_of_secondary_site')
57+
```
58+
If the value 1 is returned, the site is up to date, with all the hotfixes applied on its parent primary site.
59+
60+
If the value 0 is returned, the site has not installed all the fixes that are applied to the primary site, and you should use the **Recover Secondary Site** option to update the secondary site.
61+
62+
## Version information
63+
No major components are updated with this release.
64+
65+
## File information
66+
File information is available in the following version-specific file lists (KB15498768_FileList.txt):
67+
- [Configuration Manager 2103](https://aka.ms/KB15498768_2103_FileList)
68+
- [Configuration Manager 2107](https://aka.ms/KB15498768_2107_FileList)
69+
- [Configuration Manager 2111](https://aka.ms/KB15498768_2111_FileList)
70+
- [Configuration Manager 2203](https://aka.ms/KB15498768_2203_FileList)
71+
- [Configuration Manager 2207](https://aka.ms/KB15498768_2207_FileList)
72+
73+
## Release history
74+
- September 20, 2022: Initial hotfix release
75+
76+
## References
77+
[Updates and servicing for Configuration Manager](../../core/servers/manage/updates.md)

memdocs/configmgr/hotfix/TOC.yml

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,8 @@ items:
99
href: 2207/14959905.md
1010
- name: KB 14978429 Connected cache update for Microsoft Endpoint Configuration Manager version 2207
1111
href: 2207/14978429.md
12+
- name: KB 15498768 NTLM connection fallback update
13+
href: 2207/15498768.md
1214
- name: Version 2203
1315
items:
1416
- name: KB 13174460 Summary of changes in 2203
@@ -19,6 +21,8 @@ items:
1921
href: 2203/14480034.md
2022
- name: KB 14244456 Update rollup for Microsoft Endpoint Configuration Manager version 2203
2123
href: 2203/14244456.md
24+
- name: KB 15498768 NTLM connection fallback update
25+
href: 2207/15498768.md
2226
- name: Version 2111
2327
items:
2428
- name: KB 10096997 Summary of changes in 2111
@@ -31,6 +35,8 @@ items:
3135
href: 2111/12819689.md
3236
- name: KB 12896009 Update rollup for Microsoft Endpoint Configuration Manager version 2111
3337
href: 2111/12896009.md
38+
- name: KB 15498768 NTLM connection fallback update
39+
href: 2207/15498768.md
3440
- name: Version 2107
3541
items:
3642
- name: KB 10096997 Summary of changes in 2107
@@ -41,6 +47,8 @@ items:
4147
href: 2107/11121541.md
4248
- name: KB 12636660 Network access account update
4349
href: 2107/12636660.md
50+
- name: KB 15498768 NTLM connection fallback update
51+
href: 2207/15498768.md
4452
- name: Version 2103
4553
items:
4654
- name: KB 9210721 Summary of changes in 2103
@@ -59,6 +67,8 @@ items:
5967
href: 2103/10589155.md
6068
- name: KB 10582136 Tenant attach update
6169
href: 2103/10582136.md
70+
- name: KB 15498768 NTLM connection fallback update
71+
href: 2207/15498768.md
6272
- name: Version 2010
6373
items:
6474
- name: KB 4599442 Summary of changes in 2010

memdocs/configmgr/hotfix/index.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,8 @@ landingContent:
2525
url: 2207/14840616.md
2626
- text: KB 14959905 Early update ring
2727
url: 2207/14959905.md
28+
- text: KB 15498768 NTLM connection fallback update
29+
url: 2207/15498768.md
2830

2931
- title: Configuration Manager 2203
3032
linkLists:

memdocs/intune/apps/mam-faq.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -206,7 +206,7 @@ sections:
206206
207207
- question: Intune App Protection Policies provide the capability for admins to require end user devices to pass Google's SafetyNet Attestation for Android devices. How often is a new SafetyNet Attestation result sent to the service?
208208
answer: |
209-
A new Google Play service determination will be reported to the IT admin at an interval determined by the Intune service. How often the service call is made is throttled due to load, thus this value is maintained internally and is not configurable. Any IT admin configured action for the Google SafetyNet Attestation setting will be taken based on the last reported result to the Intune service at the time of conditional launch. If there is no data, access will be allowed depending on no other conditional launch checks failing, and Google Play Service "roundtrip" for determining attestation results will begin in the backend and prompt the user asynchronously if the device has failed. If there is stale data, access will be blocked or allowed depending on the last reported result, and similarly, a Google Play Service "roundtrip" for determining attestation results will begin and prompt the user asynchronously if the device has failed.
209+
The Intune service will contact Google Play at a non-configurable interval determined by service load. Any IT admin configured action for the Google SafetyNet Attestation setting will be taken based on the last reported result to the Intune service at the time of conditional launch. If the Google SafetyNet Attestation result is compliant, no action is taken. If the Google SafetyNet Attestation result is non-compliant, the IT admin configured action will be taken immediately. If the request to the Google SafetyNet Attestation fails for any reason, the cached result from the previous request will be used for up to 24 hours or the next device restart, which ever comes first. At that time Intune App Protection Policies will block access until a current result can be obtained.
210210
211211
- question: Intune App Protection Policies provide the capability for admins to require end user devices to send signals via Google's Verify Apps API for Android devices. How can an end user turn on the app scan so that they are not blocked from access due to this?
212212
answer: |

memdocs/intune/apps/manage-microsoft-office.md

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -120,6 +120,7 @@ Office supports the following settings for configuration:
120120

121121
- Manage the creation of Sticky Notes
122122
- Set add-ins preference
123+
- Manage Teams apps running on Office app for Android (in preview)
123124

124125
### Manage the creation of Sticky Notes
125126

@@ -145,6 +146,22 @@ If you need to enable or disable the Office Store portion of the platform for iO
145146

146147
For more information about adding configuration keys, see [Add app configuration policies for managed iOS/iPadOS devices](../apps/app-configuration-policies-use-ios.md).
147148

149+
### Manage Teams apps running on Office app for Android (in preview)
150+
151+
Teams personal tab apps are already in preview for Office.com and Outlook desktop in Target Release, and IT admins can manage access to Teams apps by creating [custom permission policies](/MicrosoftTeams/teams-app-permission-policies#create-a-custom-app-permission-policy) and [assigning these policies to users](/MicrosoftTeams/policy-assignment-overview) using Teams admin center. You can now also run Teams personal tab apps in Office app for Android, in preview. Teams personal tab apps built using [Microsoft Teams JavaScript client SDK v2](/microsoftteams/platform/tabs/how-to/using-teams-client-sdk?tabs=javascript%2Cmanifest-teams-toolkit) (version 2.0.0) and [Teams App manifest](/microsoftteams/platform/resources/schema/manifest-schema) (version 1.13) appear in Office app for Android under the “Apps” menu.
152+
153+
There may be additional management requirements specific to Office app for Android. You may want to:
154+
- Only allow specific users in your organization to try enhanced Teams apps on Office app for Android, or
155+
- Block all users in your organization from using enhanced Teams apps on Office app for Android.
156+
157+
To manage these, you can use the following key:
158+
159+
| Key | Value |
160+
|-------------------------------------------------------------------|-------------|
161+
| com.microsoft.office.officemobile.TeamsApps.IsAllowed | **true** (default) enables Teams apps on Office app for Android<br>**false** disables Teams apps on Office app for Android |
162+
163+
This key can be used both by managed devices and managed apps.
164+
148165
## Data protection app configuration scenarios
149166

150167
Office for iOS and Android supports app configuration policies for the following data protection settings when the app is managed by Microsoft Endpoint Manager with an Intune App Protection Policy applied to the work or school account that is signed into the app and the policy settings are delivered only through a managed apps App Configuration Policy:

memdocs/intune/protect/microsoft-tunnel-prerequisites.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -236,7 +236,8 @@ When creating the Server configuration for the tunnel, you can specify a differe
236236
- `*.blob.storage.azure.net`
237237

238238

239-
- The Tunnel shares the same requirements as [Network endpoints for Microsoft Intune](../fundamentals/intune-endpoints.md), with the addition of port TCP 22.
239+
240+
- The Tunnel shares the same requirements as [Network endpoints for Microsoft Intune](../fundamentals/intune-endpoints.md), with the addition of port TCP 22, and graph.microsoft.com.
240241

241242
- Configure firewall rules to support the configurations detailed in [Microsoft Container Registry (MCR) Client Firewall Rules Configuration](https://github.com/microsoft/containerregistry/blob/master/client-firewall-rules.md).
242243

memdocs/intune/user-help/TOC.yml

Lines changed: 14 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -26,8 +26,10 @@ items:
2626
href: enroll-device-android-company-portal.md
2727
- name: Enroll with Android work profile
2828
href: enroll-device-android-work-profile.md
29-
- name: Enroll with Microsoft Intune app
30-
href: enroll-device-android-microsoft-intune-app.md
29+
- name: Enroll Android with Microsoft Intune app
30+
href: enroll-device-android-microsoft-intune-app.md
31+
- name: Enroll AOSP with Microsoft Intune app
32+
href: enroll-device-aosp.md
3133
- name: Enroll with derived credentials
3234
items:
3335
- name: Enroll with Entrust
@@ -50,7 +52,16 @@ items:
5052
href: use-verbose-logging-to-help-your-it-administrator-fix-device-issues-android.md
5153
- name: Turn off Microsoft data collection
5254
href: turn-off-microsoft-usage-data-collection-android.md
53-
55+
- name: Microsoft Intune app for AOSP
56+
items:
57+
- name: Check device compliance
58+
href: check-compliance-aosp.md
59+
- name: Sync device
60+
href: sync-device-aosp.md
61+
- name: Configure logging settings
62+
href: intune-app-logs-aosp.md
63+
- name: Turn off Microsoft data collection
64+
href: turn-off-microsoft-usage-data-collection-aosp.md
5465
- name: Update device settings
5566
items:
5667
- name: Move to new device management setup
Lines changed: 58 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,58 @@
1+
---
2+
# required metadata
3+
4+
title: Check compliance on your AOSP device | Microsoft Docs
5+
description: Use the Intune app to check in and confirm that the settings on your device meet your organization's requirements.
6+
keywords:
7+
author: lenewsad
8+
ms.author: lanewsad
9+
manager: dougeby
10+
ms.date: 09/19/2022
11+
ms.topic: end-user-help
12+
ms.service: microsoft-intune
13+
ms.subservice: end-user
14+
ms.technology:
15+
ms.assetid:
16+
searchScope:
17+
- User help
18+
19+
# optional metadata
20+
21+
ROBOTS:
22+
#audience:
23+
24+
ms.reviewer:
25+
ms.suite: ems
26+
#ms.tgt_pltfrm:
27+
ms.custom: intune-enduser
28+
ms.collection:
29+
---
30+
31+
# Check compliance on your AOSP device
32+
33+
Manually start a device check-in from the Microsoft Intune app to:
34+
35+
* Force the Intune app to check device compliance
36+
* Update your device status
37+
* Regain access to your work or school resources
38+
39+
## Purpose of check-in
40+
41+
During a check-in, the Intune app confirms that the settings on your device meet your organization's policy requirements. Your organization can limit or restrict access to work or school resources until you check in.
42+
43+
If you recently made changes to your device settings, you may need to manually check in to register these changes with Company Portal.
44+
45+
## Check compliance
46+
Complete these steps to check device settings or refresh your compliance status.
47+
48+
1. Open the Microsoft Intune app for AOSP on your device.
49+
50+
2. Tap **Devices** and then select your device.
51+
52+
3. Under **Device Settings Status**, tap **Refresh**.
53+
54+
The Intune app will check your device to confirm that it's meeting your organization's setting requirements.
55+
56+
4. After the check, your device settings status will either read, **In Compliance** or **Not in Compliance**.
57+
58+
If you're required to make any changes, a message will appear at the top of the screen. Tap it for more details.
Lines changed: 64 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,64 @@
1+
---
2+
# required metadata
3+
4+
title: Enroll AOSP device with Microsoft Intune app| Microsoft Docs
5+
description: Describes how to enroll a corporate-owned AOSP device in Intune.
6+
keywords:
7+
author: lenewsad
8+
ms.author: lanewsad
9+
manager: dougeby
10+
ms.date: 09/19/2022
11+
ms.topic: end-user-help
12+
ms.prod:
13+
ms.service: microsoft-intune
14+
ms.subservice: end-user
15+
ms.technology:
16+
ms.assetid:
17+
searchScope:
18+
- User help
19+
20+
# optional metadata
21+
22+
ROBOTS:
23+
#audience:
24+
25+
ms.reviewer:
26+
ms.suite: ems
27+
#ms.tgt_pltfrm:
28+
ms.custom: intune-enduser
29+
ms.collection:
30+
---
31+
32+
33+
# Enroll AOSP device with the Microsoft Intune app
34+
35+
Enroll your corporate-owned AOSP device to get secure, mobile access to your organization's internal resources. This article describes the enrollment requirements and steps for AOSP devices.
36+
37+
## Prerequisites
38+
39+
AOSP devices must meet the following requirements to enroll:
40+
41+
* New or factory-reset
42+
* Running Android 10.0 or later
43+
* Corporate-owned (not a personal device)
44+
* RealWear device, updated to Firmware 11.2 or later
45+
46+
Additionally, you need the enrollment QR code that's provided by your organization.
47+
48+
## Enroll device
49+
Complete these steps to set up and enroll your device.
50+
51+
1. Turn on your new or factory-reset device.
52+
2. If prompted to, connect to Wi-Fi. Then tap **NEXT**.
53+
3. Scan the QR code provided by your organization.
54+
4. Follow the onscreen prompts to enroll your device.
55+
5. If prompted to, review the device terms and conditions. Then select **ACCEPT & CONTINUE**.
56+
6. The Microsoft Intune app opens. The next step depends on the type of device you're using. Complete the step that matches the screen shown on your device:
57+
58+
- Tap **START** to begin enrollment.
59+
- Sign in with your work account.
60+
1. Enter your email, and then tap **NEXT**.
61+
2. Enter your password, and then tap **SIGN IN** to begin enrollment.
62+
7. When you see the message that your device is ready, tap **DONE**.
63+
64+
If after enrolling you have trouble accessing your organization's resources, go to the Microsoft Intune app to verify that all of your device settings meet your organization's requirements. For more information about checking compliance, see [Check compliance on your AOSP device](check-compliance-aosp.md).
Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
---
2+
# required metadata
3+
4+
title: Configure logging settings for AOSP - Microsoft Intune| Microsoft Docs
5+
description: Learn how to adjust app logging levels in the Microsoft Intune app.
6+
keywords:
7+
author: lenewsad
8+
ms.author: lanewsad
9+
manager: dougeby
10+
ms.date: 09/19/2022
11+
ms.topic: end-user-help
12+
ms.prod:
13+
ms.service: microsoft-intune
14+
ms.subservice: end-user
15+
ms.technology:
16+
ms.assetid:
17+
searchScope:
18+
- User help
19+
20+
# optional metadata
21+
22+
ROBOTS:
23+
#audience:
24+
25+
ms.reviewer:
26+
ms.suite: ems
27+
#ms.tgt_pltfrm:
28+
ms.custom: intune-enduser
29+
ms.collection:
30+
---
31+
32+
33+
# Configure logging settings for AOSP
34+
35+
Logging enables the Microsoft Intune app to record actions that take place in the app. If you ever experience a problem in the app, and then report it, your support team will review the app logs. Verbose logging, which is the highest level of logging, is most helpful in these cases because it provides the most details about what happened in the app.
36+
37+
The log detail level defaults to **Important** in the Microsoft Intune app. To adjust the level:
38+
39+
1. Open the Microsoft Intune app.
40+
2. Tap **Settings**.
41+
3. Under **Log level detail**, select **Verbose** to increase the level of details recorded. Select **Off** to turn off logging.
42+
43+
> [!NOTE]
44+
> The logs that you send to your support team will include your email address.

0 commit comments

Comments
 (0)