Skip to content

Commit c4d5e3d

Browse files
author
Angela Fleischmann
authored
Update whats-new.md
Change all instances of "personally-owned" to personally owned" Line 1580: require --> requires Line 1952: - newly-created --> newly created - newly-synced --> newly synced
1 parent a2b6cf2 commit c4d5e3d

1 file changed

Lines changed: 22 additions & 22 deletions

File tree

memdocs/intune/fundamentals/whats-new.md

Lines changed: 22 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -271,9 +271,9 @@ When you use Microsoft Defender for Endpoint (MDE) as your Mobile Threat Defense
271271

272272
- **Enable App Sync for iOS Devices**: Set to **On** to allow MDE to request metadata of iOS applications from Intune to use for threat analysis purposes. The iOS device must be MDM-enrolled and will provide updated app data during device check-in.
273273

274-
- **Send full application inventory data on personally-owned iOS/iPadOS Devices**: This setting controls the application inventory data that Intune shares with MDE when MDE syncs app data and requests the app inventory list.
274+
- **Send full application inventory data on personally owned iOS/iPadOS Devices**: This setting controls the application inventory data that Intune shares with MDE when MDE syncs app data and requests the app inventory list.
275275

276-
When set to **On**, MDE can request a list of applications from Intune for personally-owned iOS/iPadOS devices. This includes unmanaged apps as well as apps that were deployed through Intune.
276+
When set to **On**, MDE can request a list of applications from Intune for personally owned iOS/iPadOS devices. This includes unmanaged apps as well as apps that were deployed through Intune.
277277

278278
When set to **Off**, data about unmanaged apps isn’t provided. Intune does share data for the apps that were deployed through Intune.
279279

@@ -1011,11 +1011,11 @@ With this support, you’ll find the Intune [connector for Zimperium](../protect
10111011
The GCC High environment is a more regulated environment, and only connectors for those MTD partners that are supported for the GCC High environment are available in it. For more information about support in GCC High tenants, [Microsoft Intune for US Government GCC High and DoD service description](/enterprise-mobility-security/solutions/ems-intune-govt-service-description).
10121012

10131013
#### Manage the app inventory data for iOS/iPadOS devices that Intune sends to third-party MTD partners<!-- 10722315 -->
1014-
You can now configure the type of application inventory data for personally-owned iOS/iPadOS devices that Intune sends to your chosen third-party Mobile Threat Defense (MTD) partner.
1014+
You can now configure the type of application inventory data for personally owned iOS/iPadOS devices that Intune sends to your chosen third-party Mobile Threat Defense (MTD) partner.
10151015

10161016
To control the app inventory data, configure the following setting as part of the *MDM Compliance Policy Settings* on the [Mobile Threat Defense connector](../protect/mtd-connector-enable.md#to-enable-the-mobile-threat-defense-connector) for your partner:
10171017

1018-
- **Send full application inventory data on personally-owned iOS/iPadOS Devices**
1018+
- **Send full application inventory data on personally owned iOS/iPadOS Devices**
10191019

10201020
Options for this setting include:
10211021
- **On** - If your MTD partner syncs app data and requests a list of the iOS/iPadOS applications from Intune, that list includes unmanage apps (those not deployed through Intune) in addition to those deployed through Intune. This is the current behavior.
@@ -1577,7 +1577,7 @@ Now whenever Microsoft makes changes to the mappings in Intune, the **MDM Suppor
15771577
### App management
15781578

15791579
#### Update Android Company Portal and Intune apps for custom notifications<!-- 12473860 -->
1580-
We have made service side updates to custom notifications for Intune's November (2111) service release, which require users to have updated to recent versions of the Android Company Portal (version 5.0.5291.0, released in October 2021) or Android Intune app (version 2021.09.04, released in September 2021) for the best user experience. If users do not update prior to Intune's November (2111) service release and they are sent a custom notification, they will instead receive a notification telling them to update their app to view the notification. Once they update their app, they will see the message sent by your organization in the Notifications section in the app. For related information, see [Send custom notifications in Intune](../remote-actions/custom-notifications.md#receive-a-custom-notification).
1580+
We have made service side updates to custom notifications for Intune's November (2111) service release, which requires users to have updated to recent versions of the Android Company Portal (version 5.0.5291.0, released in October 2021) or Android Intune app (version 2021.09.04, released in September 2021) for the best user experience. If users do not update prior to Intune's November (2111) service release and they are sent a custom notification, they will instead receive a notification telling them to update their app to view the notification. Once they update their app, they will see the message sent by your organization in the Notifications section in the app. For related information, see [Send custom notifications in Intune](../remote-actions/custom-notifications.md#receive-a-custom-notification).
15811581

15821582
<!-- vvvvvvvvvvvvvvvvvvvvvv -->
15831583

@@ -1642,7 +1642,7 @@ The following protected apps are now available for Microsoft Intune:
16421642

16431643
For more information about protected apps, see [Microsoft Intune protected apps](../apps/apps-supported-intune-apps.md).
16441644

1645-
#### Connected app support for Android personally-owned and corporate-owned work profiles<!-- 9206112 -->
1645+
#### Connected app support for Android personally owned and corporate-owned work profiles<!-- 9206112 -->
16461646
You can now allow users to turn on Connected apps experiences for supported apps. This app configuration setting enables users to connect the app information across the work and personal app instances. In [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), choose **Apps** > **App configuration policies** > **Add** > **Managed devices**. For more information, see [Add app configuration policies for managed Android Enterprise devices](../apps/app-configuration-policies-use-android.md).
16471647

16481648
<!-- vvvvvvvvvvvvvvvvvvvvvv -->
@@ -1717,7 +1717,7 @@ For more information about protected apps, see [Microsoft Intune protected apps]
17171717
### Device management
17181718

17191719
#### Removal of Wi-Fi MAC address on specific Android Enterprise devices<!-- 11004658 -->
1720-
Intune will no longer display a Wi-Fi MAC address for newly enrolled personally-owned work profile devices and devices managed with device administrator running Android 9 and above. Google is requiring all app updates to target [API 30 by November 2021](https://developer.android.com/distribute/play-policies#APILevel30). With this change, Android prevents apps from collecting the MAC address used by the device. For related information, see [Hardware device details](../remote-actions/device-inventory.md#hardware-device-details).
1720+
Intune will no longer display a Wi-Fi MAC address for newly enrolled personally owned work profile devices and devices managed with device administrator running Android 9 and above. Google is requiring all app updates to target [API 30 by November 2021](https://developer.android.com/distribute/play-policies#APILevel30). With this change, Android prevents apps from collecting the MAC address used by the device. For related information, see [Hardware device details](../remote-actions/device-inventory.md#hardware-device-details).
17211721

17221722
<!-- ########################## -->
17231723
#### Use Feature Updates to upgrade devices to Windows 11<!-- 10053623 -->
@@ -1808,7 +1808,7 @@ Intune enrollment and the Company Portal now support [macOS 10.15 and later](../
18081808

18091809
You can now choose the following Android enrollment types when filtering by **OS** in the **All devices** list in Intune:
18101810

1811-
- Android (personally-owned work profile)
1811+
- Android (personally owned work profile)
18121812
- Android (corporate-owned work profile)
18131813
- Android (fully managed)
18141814
- Android (dedicated)
@@ -1949,7 +1949,7 @@ You can now enable Outlook S/MIME settings to always sign and/or always encrypt
19491949

19501950
#### Scope tags for Managed Google Play apps<!-- 6114508 -->
19511951

1952-
Scope tags determine which objects an admin with specific rights can view in Intune. Most newly-created items in Intune take on the scope tags of the creator. This is not the case for Managed Google Play Store apps. You can now optionally assign a scope tag to apply to all newly-synced Managed Google Play apps on the **Managed Google Play connector** pane. The chosen scope tag will only apply to new Managed Google Play apps, not Managed Google Play apps that have already been approved in the tenant. For related information see [Add Managed Google Play apps to Android Enterprise devices with Intune](../apps/apps-add-android-for-work.md) and [Use role-based access control (RBAC) and scope tags for distributed IT](../fundamentals/scope-tags.md).
1952+
Scope tags determine which objects an admin with specific rights can view in Intune. Most newly created items in Intune take on the scope tags of the creator. This is not the case for Managed Google Play Store apps. You can now optionally assign a scope tag to apply to all newly-synced Managed Google Play apps on the **Managed Google Play connector** pane. The chosen scope tag will only apply to new Managed Google Play apps, not Managed Google Play apps that have already been approved in the tenant. For related information see [Add Managed Google Play apps to Android Enterprise devices with Intune](../apps/apps-add-android-for-work.md) and [Use role-based access control (RBAC) and scope tags for distributed IT](../fundamentals/scope-tags.md).
19531953

19541954
#### Content of macOS LOB apps will be displayed in Intune<!-- 6991005 -->
19551955

@@ -2030,9 +2030,9 @@ Applies to:
20302030

20312031
- iOS/iPadOS
20322032

2033-
#### Add certificate server names to enterprise Wi-Fi profiles on Android Enterprise personally-owned devices with a work profile<!-- 10285509 -->
2033+
#### Add certificate server names to enterprise Wi-Fi profiles on Android Enterprise personally owned devices with a work profile<!-- 10285509 -->
20342034

2035-
On Android devices, you can use certificate-based authentication for Wi-Fi networks on personal devices with a work profile (**Devices** > **Configuration profiles** > **Create profile** > **Android Enterprise** for platform > **Personally-owned work profile** > **Wi-Fi**).
2035+
On Android devices, you can use certificate-based authentication for Wi-Fi networks on personal devices with a work profile (**Devices** > **Configuration profiles** > **Create profile** > **Android Enterprise** for platform > **Personally owned work profile** > **Wi-Fi**).
20362036

20372037
When you use the **Enterprise** Wi-Fi type, and select the **EAP type**, there's a new **Certificate server names** setting. Use this setting to add a list of the certificate server domain names used by your certificate. For example, enter `srv.contoso.com`.
20382038

@@ -2102,9 +2102,9 @@ The status for this internal network access check is reported as *Internal netwo
21022102

21032103
Your servers will need to upgrade to the latest version of the Tunnel Gateway server software for this feature to work.
21042104

2105-
#### Compliance setting for SafetyNet hardware-backed key attestation for Android Enterprise personally-owned work profile<!--8903071 -->
2105+
#### Compliance setting for SafetyNet hardware-backed key attestation for Android Enterprise personally owned work profile<!--8903071 -->
21062106

2107-
We’ve added a new device compliance setting for Android Enterprise personally-owned work profile devices, [Required SafetyNet evaluation type](../protect/compliance-policy-create-android-for-work.md#google-play-protect---for-personally-owned-work-profile). This new setting becomes available after you configure *SafetyNet device attestation* to either *Check basic integrity* or *Check basic integrity & certified devices*. The new setting:
2107+
We’ve added a new device compliance setting for Android Enterprise personally owned work profile devices, [Required SafetyNet evaluation type](../protect/compliance-policy-create-android-for-work.md#google-play-protect---for-personally owned-work-profile). This new setting becomes available after you configure *SafetyNet device attestation* to either *Check basic integrity* or *Check basic integrity & certified devices*. The new setting:
21082108

21092109
**Required SafetyNet evaluation type**:
21102110

@@ -2581,7 +2581,7 @@ We have a pair of updates to announce for the Microsoft Tunnel Gateway this mont
25812581
- Android Enterprise Fully Managed
25822582
- Android Enterprise Corporate-Owned Work Profile
25832583

2584-
However, for an Android Enterprise Personally-Owned Work profile, use *only* the VPN profile with custom settings. Personally-Owned Work Profile devices that receive a separate app configuration profile for Microsoft Defender for Endpoint in addition to a Microsoft Tunnel VPN profile may be unable to connect to the Microsoft Tunnel.
2584+
However, for an Android Enterprise Personally Owned Work profile, use *only* the VPN profile with custom settings. Personally Owned Work Profile devices that receive a separate app configuration profile for Microsoft Defender for Endpoint in addition to a Microsoft Tunnel VPN profile may be unable to connect to the Microsoft Tunnel.
25852585

25862586
<!-- vvvvvvvvvvvvvvvvvvvvvv -->
25872587
### Monitor and troubleshoot
@@ -2788,7 +2788,7 @@ We’ve streamlined the conditional access flow on Surface Duo devices. These ch
27882788
On a Duo device:
27892789

27902790
- When access to a resource is blocked by conditional access, users are now redirected to the Company Portal app that was preinstalled on the device. Previously, they were sent to the Google Play store listing of the Company Portal app.
2791-
- For devices that are enrolled as a personally-owned work profile, when a user tries to sign in to a personal version of an app using their work credentials they are now sent to the work version of the Company Portal where guidance messaging is shown. Previously, the user was sent to the Google Play store listing of the personal version of the Company Portal app, where they would have had to reenable the personal Company Portal to see the guidance messaging.
2791+
- For devices that are enrolled as a personally owned work profile, when a user tries to sign in to a personal version of an app using their work credentials they are now sent to the work version of the Company Portal where guidance messaging is shown. Previously, the user was sent to the Google Play store listing of the personal version of the Company Portal app, where they would have had to reenable the personal Company Portal to see the guidance messaging.
27922792

27932793
#### Configure options that apply to Tunnel Gateway server upgrades<!-- 8664465 -->
27942794

@@ -2956,7 +2956,7 @@ This public preview applies to:
29562956
- Android Enterprise
29572957
- Fully managed
29582958
- Corporate-owned work profile
2959-
- Personally-owned work profile
2959+
- Personally owned work profile
29602960

29612961
For this preview, you must opt in to gain access to the preview version of Microsoft Defender for Endpoint, and then migrate supported devices from the standalone Tunnel client app to the preview app. For details, see [Migrate to the Microsoft Defender for Endpoint app](../protect/microsoft-tunnel-migrate-app.md).
29622962

@@ -3102,7 +3102,7 @@ To see these options, go to [Microsoft Endpoint Manager admin center](https://go
31023102
You can now use the User attribute **CN={{UserPrincipalName}}** variable in the subject or SAN of a [PKCS certificate profile](../protect/certificates-pfx-configure.md#create-a-trusted-certificate-profile) or [SCEP certificate profile](../protect/certificates-profile-scep.md#create-a-scep-certificate-profile) for Android devices. This support requires the device have a user, such as devices enrolled as:
31033103

31043104
- Android Enterprise fully managed
3105-
- Android Enterprise personally-owned work profile
3105+
- Android Enterprise personally owned work profile
31063106

31073107
User attributes are not supported for devices that don’t have user associations, such as devices that are enrolled as Android Enterprise dedicated. For example, a profile that uses *CN={{UserPrincipalName}}* in the subject or SAN won’t be able to get the user principal name when there is no user on the device.
31083108

@@ -3282,12 +3282,12 @@ Applies to:
32823282
When you create a VPN profile, NetMotion Mobility is available as a VPN connection type for Android Enterprise:
32833283

32843284
- **Devices** > **Device configuration** > **Create profile** > **Android Enterprise** > **Fully Managed, Dedicated, and Corporate-Owned Work Profile** > **VPN** for profile > **NetMotion Mobility** for connection type
3285-
- **Devices** > **Device configuration** > **Create profile** > **Android Enterprise** > **Personally-Owned Work Profile** > **VPN** for profile > **NetMotion Mobility** for connection type
3285+
- **Devices** > **Device configuration** > **Create profile** > **Android Enterprise** > **Personally Owned Work Profile** > **VPN** for profile > **NetMotion Mobility** for connection type
32863286

32873287
For more information on VPN profiles in Intune, see [Create VPN profiles to connect to VPN servers](../configuration/vpn-settings-configure.md).
32883288

32893289
Applies to:
3290-
- Android Enterprise Personally-Owned Work Profile
3290+
- Android Enterprise Personally Owned Work Profile
32913291
- Android Enterprise Fully Managed, Dedicated, and Corporate-Owned Work Profile
32923292

32933293
#### Settings catalog and Templates when creating device configuration profiles for macOS and Windows client devices<!-- 8673623 8254609 -->
@@ -3496,9 +3496,9 @@ For related information, see [Microsoft Intune Data Warehouse API](../developer/
34963496

34973497
We've updated the app icon for the Company Portal for iOS, macOS, and web. This icon is also used by the Company Portal for Windows. End users will see the new icon in their device's application launcher and home screen, in Apple's App Store, and in experiences within the Company Portal apps.
34983498

3499-
#### Android Enterprise system app support in personally-owned work profiles<!-- 5291507 -->
3499+
#### Android Enterprise system app support in personally owned work profiles<!-- 5291507 -->
35003500

3501-
You can now deploy Android Enterprise system apps to Android Enterprise personally-owned work profile devices. System apps are apps that do not appear in the Managed Google Play Store and often come pre-installed on the device. Once a system app is deployed, you will be unable to uninstall, hide, or otherwise remove the system app. For related information about system apps, see [Add Android Enterprise system apps to Microsoft Intune](../apps/apps-ae-system.md).
3501+
You can now deploy Android Enterprise system apps to Android Enterprise personally owned work profile devices. System apps are apps that do not appear in the Managed Google Play Store and often come pre-installed on the device. Once a system app is deployed, you will be unable to uninstall, hide, or otherwise remove the system app. For related information about system apps, see [Add Android Enterprise system apps to Microsoft Intune](../apps/apps-ae-system.md).
35023502

35033503
<!-- vvvvvvvvvvvvvvvvvvvvvv -->
35043504
### Monitor and troubleshoot
@@ -3548,7 +3548,7 @@ For more information about certificate connectors, including a list of connector
35483548

35493549
#### Browser access enabled automatically during Android work profile enrollment<!-- 5411101 -->
35503550

3551-
During new Android Enterprise personally-owned work profile enrollments, browser access is now automatically enabled on the device. With this change, compliant devices can use the browser to access resources that are protected by conditional access without needing to take additional actions. Before this change, users had to launch the Company Portal and select **Settings** > **Enable Browser Access**, and then click **Enable**.
3551+
During new Android Enterprise personally owned work profile enrollments, browser access is now automatically enabled on the device. With this change, compliant devices can use the browser to access resources that are protected by conditional access without needing to take additional actions. Before this change, users had to launch the Company Portal and select **Settings** > **Enable Browser Access**, and then click **Enable**.
35523552

35533553
This change has no impact on devices that are already enrolled.
35543554

0 commit comments

Comments
 (0)