You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Change all instances of "personally-owned" to personally owned"
Line 1580: require --> requires
Line 1952:
- newly-created --> newly created
- newly-synced --> newly synced
Copy file name to clipboardExpand all lines: memdocs/intune/fundamentals/whats-new.md
+22-22Lines changed: 22 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -271,9 +271,9 @@ When you use Microsoft Defender for Endpoint (MDE) as your Mobile Threat Defense
271
271
272
272
-**Enable App Sync for iOS Devices**: Set to **On** to allow MDE to request metadata of iOS applications from Intune to use for threat analysis purposes. The iOS device must be MDM-enrolled and will provide updated app data during device check-in.
273
273
274
-
-**Send full application inventory data on personally-owned iOS/iPadOS Devices**: This setting controls the application inventory data that Intune shares with MDE when MDE syncs app data and requests the app inventory list.
274
+
-**Send full application inventory data on personallyowned iOS/iPadOS Devices**: This setting controls the application inventory data that Intune shares with MDE when MDE syncs app data and requests the app inventory list.
275
275
276
-
When set to **On**, MDE can request a list of applications from Intune for personally-owned iOS/iPadOS devices. This includes unmanaged apps as well as apps that were deployed through Intune.
276
+
When set to **On**, MDE can request a list of applications from Intune for personallyowned iOS/iPadOS devices. This includes unmanaged apps as well as apps that were deployed through Intune.
277
277
278
278
When set to **Off**, data about unmanaged apps isn’t provided. Intune does share data for the apps that were deployed through Intune.
279
279
@@ -1011,11 +1011,11 @@ With this support, you’ll find the Intune [connector for Zimperium](../protect
1011
1011
The GCC High environment is a more regulated environment, and only connectors for those MTD partners that are supported for the GCC High environment are available in it. For more information about support in GCC High tenants, [Microsoft Intune for US Government GCC High and DoD service description](/enterprise-mobility-security/solutions/ems-intune-govt-service-description).
1012
1012
1013
1013
#### Manage the app inventory data for iOS/iPadOS devices that Intune sends to third-party MTD partners<!-- 10722315 -->
1014
-
You can now configure the type of application inventory data for personally-owned iOS/iPadOS devices that Intune sends to your chosen third-party Mobile Threat Defense (MTD) partner.
1014
+
You can now configure the type of application inventory data for personallyowned iOS/iPadOS devices that Intune sends to your chosen third-party Mobile Threat Defense (MTD) partner.
1015
1015
1016
1016
To control the app inventory data, configure the following setting as part of the *MDM Compliance Policy Settings* on the [Mobile Threat Defense connector](../protect/mtd-connector-enable.md#to-enable-the-mobile-threat-defense-connector) for your partner:
1017
1017
1018
-
-**Send full application inventory data on personally-owned iOS/iPadOS Devices**
1018
+
-**Send full application inventory data on personallyowned iOS/iPadOS Devices**
1019
1019
1020
1020
Options for this setting include:
1021
1021
-**On** - If your MTD partner syncs app data and requests a list of the iOS/iPadOS applications from Intune, that list includes unmanage apps (those not deployed through Intune) in addition to those deployed through Intune. This is the current behavior.
@@ -1577,7 +1577,7 @@ Now whenever Microsoft makes changes to the mappings in Intune, the **MDM Suppor
1577
1577
### App management
1578
1578
1579
1579
#### Update Android Company Portal and Intune apps for custom notifications<!-- 12473860 -->
1580
-
We have made service side updates to custom notifications for Intune's November (2111) service release, which require users to have updated to recent versions of the Android Company Portal (version 5.0.5291.0, released in October 2021) or Android Intune app (version 2021.09.04, released in September 2021) for the best user experience. If users do not update prior to Intune's November (2111) service release and they are sent a custom notification, they will instead receive a notification telling them to update their app to view the notification. Once they update their app, they will see the message sent by your organization in the Notifications section in the app. For related information, see [Send custom notifications in Intune](../remote-actions/custom-notifications.md#receive-a-custom-notification).
1580
+
We have made service side updates to custom notifications for Intune's November (2111) service release, which requires users to have updated to recent versions of the Android Company Portal (version 5.0.5291.0, released in October 2021) or Android Intune app (version 2021.09.04, released in September 2021) for the best user experience. If users do not update prior to Intune's November (2111) service release and they are sent a custom notification, they will instead receive a notification telling them to update their app to view the notification. Once they update their app, they will see the message sent by your organization in the Notifications section in the app. For related information, see [Send custom notifications in Intune](../remote-actions/custom-notifications.md#receive-a-custom-notification).
1581
1581
1582
1582
<!-- vvvvvvvvvvvvvvvvvvvvvv -->
1583
1583
@@ -1642,7 +1642,7 @@ The following protected apps are now available for Microsoft Intune:
1642
1642
1643
1643
For more information about protected apps, see [Microsoft Intune protected apps](../apps/apps-supported-intune-apps.md).
1644
1644
1645
-
#### Connected app support for Android personally-owned and corporate-owned work profiles<!-- 9206112 -->
1645
+
#### Connected app support for Android personallyowned and corporate-owned work profiles<!-- 9206112 -->
1646
1646
You can now allow users to turn on Connected apps experiences for supported apps. This app configuration setting enables users to connect the app information across the work and personal app instances. In [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), choose **Apps** > **App configuration policies** > **Add** > **Managed devices**. For more information, see [Add app configuration policies for managed Android Enterprise devices](../apps/app-configuration-policies-use-android.md).
1647
1647
1648
1648
<!-- vvvvvvvvvvvvvvvvvvvvvv -->
@@ -1717,7 +1717,7 @@ For more information about protected apps, see [Microsoft Intune protected apps]
1717
1717
### Device management
1718
1718
1719
1719
#### Removal of Wi-Fi MAC address on specific Android Enterprise devices<!-- 11004658 -->
1720
-
Intune will no longer display a Wi-Fi MAC address for newly enrolled personally-owned work profile devices and devices managed with device administrator running Android 9 and above. Google is requiring all app updates to target [API 30 by November 2021](https://developer.android.com/distribute/play-policies#APILevel30). With this change, Android prevents apps from collecting the MAC address used by the device. For related information, see [Hardware device details](../remote-actions/device-inventory.md#hardware-device-details).
1720
+
Intune will no longer display a Wi-Fi MAC address for newly enrolled personallyowned work profile devices and devices managed with device administrator running Android 9 and above. Google is requiring all app updates to target [API 30 by November 2021](https://developer.android.com/distribute/play-policies#APILevel30). With this change, Android prevents apps from collecting the MAC address used by the device. For related information, see [Hardware device details](../remote-actions/device-inventory.md#hardware-device-details).
1721
1721
1722
1722
<!-- ########################## -->
1723
1723
#### Use Feature Updates to upgrade devices to Windows 11<!-- 10053623 -->
@@ -1808,7 +1808,7 @@ Intune enrollment and the Company Portal now support [macOS 10.15 and later](../
1808
1808
1809
1809
You can now choose the following Android enrollment types when filtering by **OS** in the **All devices** list in Intune:
1810
1810
1811
-
- Android (personally-owned work profile)
1811
+
- Android (personallyowned work profile)
1812
1812
- Android (corporate-owned work profile)
1813
1813
- Android (fully managed)
1814
1814
- Android (dedicated)
@@ -1949,7 +1949,7 @@ You can now enable Outlook S/MIME settings to always sign and/or always encrypt
1949
1949
1950
1950
#### Scope tags for Managed Google Play apps<!-- 6114508 -->
1951
1951
1952
-
Scope tags determine which objects an admin with specific rights can view in Intune. Most newly-created items in Intune take on the scope tags of the creator. This is not the case for Managed Google Play Store apps. You can now optionally assign a scope tag to apply to all newly-synced Managed Google Play apps on the **Managed Google Play connector** pane. The chosen scope tag will only apply to new Managed Google Play apps, not Managed Google Play apps that have already been approved in the tenant. For related information see [Add Managed Google Play apps to Android Enterprise devices with Intune](../apps/apps-add-android-for-work.md) and [Use role-based access control (RBAC) and scope tags for distributed IT](../fundamentals/scope-tags.md).
1952
+
Scope tags determine which objects an admin with specific rights can view in Intune. Most newlycreated items in Intune take on the scope tags of the creator. This is not the case for Managed Google Play Store apps. You can now optionally assign a scope tag to apply to all newly-synced Managed Google Play apps on the **Managed Google Play connector** pane. The chosen scope tag will only apply to new Managed Google Play apps, not Managed Google Play apps that have already been approved in the tenant. For related information see [Add Managed Google Play apps to Android Enterprise devices with Intune](../apps/apps-add-android-for-work.md) and [Use role-based access control (RBAC) and scope tags for distributed IT](../fundamentals/scope-tags.md).
1953
1953
1954
1954
#### Content of macOS LOB apps will be displayed in Intune<!-- 6991005 -->
1955
1955
@@ -2030,9 +2030,9 @@ Applies to:
2030
2030
2031
2031
- iOS/iPadOS
2032
2032
2033
-
#### Add certificate server names to enterprise Wi-Fi profiles on Android Enterprise personally-owned devices with a work profile<!-- 10285509 -->
2033
+
#### Add certificate server names to enterprise Wi-Fi profiles on Android Enterprise personallyowned devices with a work profile<!-- 10285509 -->
2034
2034
2035
-
On Android devices, you can use certificate-based authentication for Wi-Fi networks on personal devices with a work profile (**Devices** > **Configuration profiles** > **Create profile** > **Android Enterprise** for platform > **Personally-owned work profile** > **Wi-Fi**).
2035
+
On Android devices, you can use certificate-based authentication for Wi-Fi networks on personal devices with a work profile (**Devices** > **Configuration profiles** > **Create profile** > **Android Enterprise** for platform > **Personallyowned work profile** > **Wi-Fi**).
2036
2036
2037
2037
When you use the **Enterprise** Wi-Fi type, and select the **EAP type**, there's a new **Certificate server names** setting. Use this setting to add a list of the certificate server domain names used by your certificate. For example, enter `srv.contoso.com`.
2038
2038
@@ -2102,9 +2102,9 @@ The status for this internal network access check is reported as *Internal netwo
2102
2102
2103
2103
Your servers will need to upgrade to the latest version of the Tunnel Gateway server software for this feature to work.
2104
2104
2105
-
#### Compliance setting for SafetyNet hardware-backed key attestation for Android Enterprise personally-owned work profile<!--8903071 -->
2105
+
#### Compliance setting for SafetyNet hardware-backed key attestation for Android Enterprise personallyowned work profile<!--8903071 -->
2106
2106
2107
-
We’ve added a new device compliance setting for Android Enterprise personally-owned work profile devices, [Required SafetyNet evaluation type](../protect/compliance-policy-create-android-for-work.md#google-play-protect---for-personally-owned-work-profile). This new setting becomes available after you configure *SafetyNet device attestation* to either *Check basic integrity* or *Check basic integrity & certified devices*. The new setting:
2107
+
We’ve added a new device compliance setting for Android Enterprise personallyowned work profile devices, [Required SafetyNet evaluation type](../protect/compliance-policy-create-android-for-work.md#google-play-protect---for-personallyowned-work-profile). This new setting becomes available after you configure *SafetyNet device attestation* to either *Check basic integrity* or *Check basic integrity & certified devices*. The new setting:
2108
2108
2109
2109
**Required SafetyNet evaluation type**:
2110
2110
@@ -2581,7 +2581,7 @@ We have a pair of updates to announce for the Microsoft Tunnel Gateway this mont
2581
2581
- Android Enterprise Fully Managed
2582
2582
- Android Enterprise Corporate-Owned Work Profile
2583
2583
2584
-
However, for an Android Enterprise Personally-Owned Work profile, use *only* the VPN profile with custom settings. Personally-Owned Work Profile devices that receive a separate app configuration profile for Microsoft Defender for Endpoint in addition to a Microsoft Tunnel VPN profile may be unable to connect to the Microsoft Tunnel.
2584
+
However, for an Android Enterprise PersonallyOwned Work profile, use *only* the VPN profile with custom settings. PersonallyOwned Work Profile devices that receive a separate app configuration profile for Microsoft Defender for Endpoint in addition to a Microsoft Tunnel VPN profile may be unable to connect to the Microsoft Tunnel.
2585
2585
2586
2586
<!-- vvvvvvvvvvvvvvvvvvvvvv -->
2587
2587
### Monitor and troubleshoot
@@ -2788,7 +2788,7 @@ We’ve streamlined the conditional access flow on Surface Duo devices. These ch
2788
2788
On a Duo device:
2789
2789
2790
2790
- When access to a resource is blocked by conditional access, users are now redirected to the Company Portal app that was preinstalled on the device. Previously, they were sent to the Google Play store listing of the Company Portal app.
2791
-
- For devices that are enrolled as a personally-owned work profile, when a user tries to sign in to a personal version of an app using their work credentials they are now sent to the work version of the Company Portal where guidance messaging is shown. Previously, the user was sent to the Google Play store listing of the personal version of the Company Portal app, where they would have had to reenable the personal Company Portal to see the guidance messaging.
2791
+
- For devices that are enrolled as a personallyowned work profile, when a user tries to sign in to a personal version of an app using their work credentials they are now sent to the work version of the Company Portal where guidance messaging is shown. Previously, the user was sent to the Google Play store listing of the personal version of the Company Portal app, where they would have had to reenable the personal Company Portal to see the guidance messaging.
2792
2792
2793
2793
#### Configure options that apply to Tunnel Gateway server upgrades<!-- 8664465 -->
2794
2794
@@ -2956,7 +2956,7 @@ This public preview applies to:
2956
2956
- Android Enterprise
2957
2957
- Fully managed
2958
2958
- Corporate-owned work profile
2959
-
- Personally-owned work profile
2959
+
- Personallyowned work profile
2960
2960
2961
2961
For this preview, you must opt in to gain access to the preview version of Microsoft Defender for Endpoint, and then migrate supported devices from the standalone Tunnel client app to the preview app. For details, see [Migrate to the Microsoft Defender for Endpoint app](../protect/microsoft-tunnel-migrate-app.md).
2962
2962
@@ -3102,7 +3102,7 @@ To see these options, go to [Microsoft Endpoint Manager admin center](https://go
3102
3102
You can now use the User attribute **CN={{UserPrincipalName}}** variable in the subject or SAN of a [PKCS certificate profile](../protect/certificates-pfx-configure.md#create-a-trusted-certificate-profile) or [SCEP certificate profile](../protect/certificates-profile-scep.md#create-a-scep-certificate-profile) for Android devices. This support requires the device have a user, such as devices enrolled as:
3103
3103
3104
3104
- Android Enterprise fully managed
3105
-
- Android Enterprise personally-owned work profile
3105
+
- Android Enterprise personallyowned work profile
3106
3106
3107
3107
User attributes are not supported for devices that don’t have user associations, such as devices that are enrolled as Android Enterprise dedicated. For example, a profile that uses *CN={{UserPrincipalName}}* in the subject or SAN won’t be able to get the user principal name when there is no user on the device.
3108
3108
@@ -3282,12 +3282,12 @@ Applies to:
3282
3282
When you create a VPN profile, NetMotion Mobility is available as a VPN connection type for Android Enterprise:
3283
3283
3284
3284
-**Devices** > **Device configuration** > **Create profile** > **Android Enterprise** > **Fully Managed, Dedicated, and Corporate-Owned Work Profile** > **VPN** for profile > **NetMotion Mobility** for connection type
3285
-
-**Devices** > **Device configuration** > **Create profile** > **Android Enterprise** > **Personally-Owned Work Profile** > **VPN** for profile > **NetMotion Mobility** for connection type
3285
+
-**Devices** > **Device configuration** > **Create profile** > **Android Enterprise** > **PersonallyOwned Work Profile** > **VPN** for profile > **NetMotion Mobility** for connection type
3286
3286
3287
3287
For more information on VPN profiles in Intune, see [Create VPN profiles to connect to VPN servers](../configuration/vpn-settings-configure.md).
3288
3288
3289
3289
Applies to:
3290
-
- Android Enterprise Personally-Owned Work Profile
3290
+
- Android Enterprise PersonallyOwned Work Profile
3291
3291
- Android Enterprise Fully Managed, Dedicated, and Corporate-Owned Work Profile
3292
3292
3293
3293
#### Settings catalog and Templates when creating device configuration profiles for macOS and Windows client devices<!-- 8673623 8254609 -->
@@ -3496,9 +3496,9 @@ For related information, see [Microsoft Intune Data Warehouse API](../developer/
3496
3496
3497
3497
We've updated the app icon for the Company Portal for iOS, macOS, and web. This icon is also used by the Company Portal for Windows. End users will see the new icon in their device's application launcher and home screen, in Apple's App Store, and in experiences within the Company Portal apps.
3498
3498
3499
-
#### Android Enterprise system app support in personally-owned work profiles<!-- 5291507 -->
3499
+
#### Android Enterprise system app support in personallyowned work profiles<!-- 5291507 -->
3500
3500
3501
-
You can now deploy Android Enterprise system apps to Android Enterprise personally-owned work profile devices. System apps are apps that do not appear in the Managed Google Play Store and often come pre-installed on the device. Once a system app is deployed, you will be unable to uninstall, hide, or otherwise remove the system app. For related information about system apps, see [Add Android Enterprise system apps to Microsoft Intune](../apps/apps-ae-system.md).
3501
+
You can now deploy Android Enterprise system apps to Android Enterprise personallyowned work profile devices. System apps are apps that do not appear in the Managed Google Play Store and often come pre-installed on the device. Once a system app is deployed, you will be unable to uninstall, hide, or otherwise remove the system app. For related information about system apps, see [Add Android Enterprise system apps to Microsoft Intune](../apps/apps-ae-system.md).
3502
3502
3503
3503
<!-- vvvvvvvvvvvvvvvvvvvvvv -->
3504
3504
### Monitor and troubleshoot
@@ -3548,7 +3548,7 @@ For more information about certificate connectors, including a list of connector
3548
3548
3549
3549
#### Browser access enabled automatically during Android work profile enrollment<!-- 5411101 -->
3550
3550
3551
-
During new Android Enterprise personally-owned work profile enrollments, browser access is now automatically enabled on the device. With this change, compliant devices can use the browser to access resources that are protected by conditional access without needing to take additional actions. Before this change, users had to launch the Company Portal and select **Settings** > **Enable Browser Access**, and then click **Enable**.
3551
+
During new Android Enterprise personallyowned work profile enrollments, browser access is now automatically enabled on the device. With this change, compliant devices can use the browser to access resources that are protected by conditional access without needing to take additional actions. Before this change, users had to launch the Company Portal and select **Settings** > **Enable Browser Access**, and then click **Enable**.
3552
3552
3553
3553
This change has no impact on devices that are already enrolled.
0 commit comments