You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Select the VPN connection type from the following list of vendors:
48
48
49
49
-**Check Point Capsule VPN**
50
-
-**Cisco Legacy AnyConnect**: Applicable to Cisco Legacy AnyConnect app version 4.0.5x and earlier.
51
-
-**Cisco AnyConnect**: Applicable to [Cisco AnyConnect](https://itunes.apple.com/app/cisco-anyconnect/id1135064690) app version 4.0.7x and later.
50
+
-**Cisco Legacy AnyConnect**
51
+
52
+
Applies to Cisco Legacy AnyConnect app version 4.0.5x and earlier.
53
+
54
+
-**Cisco AnyConnect**
55
+
56
+
Applies to [Cisco AnyConnect](https://itunes.apple.com/app/cisco-anyconnect/id1135064690) app version 4.0.7x and later.
57
+
52
58
-**SonicWall Mobile Connect**
53
-
-**F5 Access Legacy**: Applicable to F5 Access app version 2.1 and earlier.
54
-
-**F5 Access**: Applicable to F5 Access app version 3.0 and later.
55
-
-**Palo Alto Networks GlobalProtect (Legacy)**: Applicable to Palo Alto Networks GlobalProtect app version 4.1 and earlier.
56
-
-**Palo Alto Networks GlobalProtect**: Applicable to Palo Alto Networks GlobalProtect app version 5.0 and later.
59
+
-**F5 Access Legacy**
60
+
61
+
Applies to F5 Access app version 2.1 and earlier.
62
+
-**F5 Access**
63
+
64
+
Applies to F5 Access app version 3.0 and later.
65
+
-**Palo Alto Networks GlobalProtect (Legacy)**
66
+
67
+
Applies to Palo Alto Networks GlobalProtect app version 4.1 and earlier.
68
+
-**Palo Alto Networks GlobalProtect**
69
+
70
+
Applies to Palo Alto Networks GlobalProtect app version 5.0 and later.
57
71
-**Pulse Secure**
58
72
-**Cisco (IPSec)**
59
73
-**Citrix VPN**
60
74
-**Citrix SSO**
61
-
-**Zscaler**: To use Conditional Access, or allow users to bypass the Zscaler sign in screen, you must integrate Zscaler Private Access (ZPA) with your Azure AD account. For detailed steps, see the [Zscaler documentation](https://help.zscaler.com/zpa/configuration-guide-microsoft-azure-ad).
75
+
-**Zscaler**
76
+
77
+
To use Conditional Access, or allow users to bypass the Zscaler sign in screen, you must integrate Zscaler Private Access (ZPA) with your Azure AD account. For detailed steps, see the [Zscaler documentation](https://help.zscaler.com/zpa/configuration-guide-microsoft-azure-ad).
62
78
-**NetMotion Mobility**
63
-
-**IKEv2**: [IKEv2 settings](#ikev2-settings) (in this article) describes the properties.
64
-
-**Microsoft Tunnel (standalone client)(preview)**: Applicable to the Microsoft Tunnel client app.
65
-
-**Microsoft Tunnel (preview)** - Applicable to the preview version of the Microsoft Defender for Endpoint app that includes Tunnel client functionality.
79
+
-**IKEv2**
80
+
81
+
[IKEv2 settings](#ikev2-settings) (in this article) describes the properties.
Applies to the preview version of the Microsoft Defender for Endpoint app that includes Tunnel client functionality.
66
88
-**Custom VPN**
67
89
68
90
> [!NOTE]
@@ -242,72 +264,115 @@ These settings apply when you choose **Connection type** > **IKEv2**.
242
264
243
265
## Automatic VPN
244
266
245
-
-**On-demand VPN**: On-demand VPN uses rules to automatically connect or disconnect the VPN connection. When your devices attempt to connect to the VPN, it looks for matches in the parameters and rules you create, such as a matching IP address or domain name. If there's a match, then the action you choose runs.
267
+
-**Type of automatic VPN**: Select the VPN type you want to configure: On-demand VPNor per-app VPN:
246
268
247
-
For example, create a condition where the VPN connection is only used when a device isn't connected to a company Wi-Fi network. Or, if a device can't access a DNS search domain you enter, then the VPN connection isn't started.
269
+
-**Not configured** (default): Intune doesn't change or update this setting.
270
+
-**On-demand VPN**: On-demand VPN uses rules to automatically connect or disconnect the VPN connection. When your devices attempt to connect to the VPN, it looks for matches in the parameters and rules you create, such as a matching domain name. If there's a match, then the action you choose runs.
248
271
249
-
-**Add**: Select this option to add a rule.
272
+
For example, you can create a condition where the VPN connection is only used when a device isn't connected to a company Wi-Fi network. Or, if a device can't access a DNS search domain you enter, then the VPN connection isn't started.
250
273
251
-
-**I want to do the following**: If there's a match between the device value and your on-demand rule, then select the action. Your options:
274
+
-**On-demand rules** > **Add**: Select **Add** to add a rule. If there isn't an existing VPN connection, then use these settings to create an on-demand rule. If there's a match to your rule, then the device does the action you select.
252
275
253
-
- Establish VPN
254
-
- Disconnect VPN
255
-
- Evaluate each connection attempt
256
-
- Ignore
276
+
-**I want to do the following**: If there's a match between the device value and your on-demand rule, then select the action you want the device to do. Your options:
257
277
258
-
-**I want to restrict to**: Select the condition that the rule must meet. Your options:
278
+
-**Establish VPN**: If there's a match between the device value and your on-demand rule, then a VPN connection is created.
279
+
-**Disconnect VPN**: If there's a match between the device value and your on-demand rule, then the VPN connection is disconnected.
280
+
-**Evaluate each connection attempt**: If there's a match between the device value and your on-demand rule, then use the **Choose whether to connect** setting to decide what happens for *each* VPN connection attempt:
281
+
-**Connect if needed**: If there isn't an existing VPN connection, then for each VPN connection attempt, decide if users should connect using a DNS domain name:
282
+
-**When users try to access these domains**: Enter one or more DNS domains, like `contoso.com`. If users try to connect to a domain in this list, then the device uses DNS to resolve the domains you enter. If the domain doesn't resolve, then a VPN connection is created. If the domain does resolve, then a VPN connection isn't created.
259
283
260
-
-**Specific SSIDs**: Enter one or more wireless network names that the rule will apply. This network name is the Service Set Identifier (SSID). For example, enter `Contoso VPN`.
261
-
-**Specific DNS domains**: Enter one or more DNS domains that the rule will apply. For example, enter `contoso.com`.
262
-
-**All domains**: Select this option to apply your rule to all domains in your organization.
284
+
Remember, domains are internal resources that aren't resolved by public DNS. A device can't access the domain from an external network. When a VPN connection is established, the internal domain can be accessed.
263
285
264
-
-**But only if this URL probe succeeds**: Optional. Enter a URL that the rule uses as a test. If the device accesses this URL without redirection, then the VPN connection is started. And, the device connects to the target URL. The user doesn't see the URL string probe site.
286
+
-**Use the following DNS servers to resolve these domains (optional)**: Enter one or more DNS server IP addresses, like `10.0.0.22`. The DNS servers you enter are used to resolve the domains in the **When users try to access these domains** setting.
265
287
266
-
For example, a URL string probe is an auditing Web server URL that checks device compliance before connecting the VPN. Or, the URL tests the VPNs ability to connect to a site before the device connects to the target URL through the VPN.
288
+
-**When this URL is unreachable, force-connect the VPN**: Optional. Enter an HTTP or HTTPS probing URL that the rule uses as a test. This URL is probed every time a user tries to access a domain in the **When users try to access these domains** setting. The user doesn't see the URL string probe site.
267
289
268
-
-**Prevent users from disabling automatic VPN**: Your options:
290
+
For example, a URL string probe is an auditing web server URL that checks device compliance before connecting the VPN. Or, the URL tests the VPNs ability to connect to a site before the device connects to the target URL through the VPN.
269
291
270
-
-**Not configured**: Intune doesn't change or update this setting.
271
-
-**Yes**: Prevents users from turning off automatic VPN. It forces users to keep the automatic VPN enabled and running.
272
-
-**No**: Allows users to turn off automatic VPN.
292
+
If the probe fails because the URL is unreachable or doesn't return a 200 HTTP status code, then a VPN connection is created.
273
293
274
-
This setting applies to:
275
-
- iOS 14 and newer
276
-
- iPadOS 14 and newer
294
+
Remember, an internal URL can't be accessed because the device is connected to an external network. A VPN connection is created on demand. Once the VPN connection is established, internal resources are available.
295
+
296
+
-**Never connect**: For each VPN connection attempt, when users try to access the domains you enter, then a VPN connection is never created.
297
+
298
+
-**When users try to access these domains**: Enter one or more DNS domains, like `contoso.com`. If users try to connect to a domain in this list, then a VPN connection isn't created. If they try to connect to a domain not in this list, then a VPN connection is created.
299
+
300
+
-**Ignore**: If there's a match between the device value and your on-demand rule, then a VPN connection is ignored.
301
+
302
+
-**I want to restrict to**: In the **I want to do the following** setting, if you select **Establish VPN**, **Disconnect VPN**, or **Ignore**, then select the condition that the rule must meet. Your options:
277
303
278
-
-**Per-app VPN**: Enables per-app VPN by associating this VPN connection with an iOS/iPadOS app. When the app runs, the VPN connection starts. You can associate the VPN profile with an app when you assign the software. For more information, see [How to assign and monitor apps](../apps/apps-deploy.md).
304
+
-**Specific SSIDs**: Enter one or more wireless network names that the rule will apply. This network name is the Service Set Identifier (SSID). For example, enter `Contoso VPN`.
305
+
-**Specific search domains**: Enter one or more DNS domains that the rule will apply. For example, enter `contoso.com`.
306
+
-**All domains**: Select this option to apply your rule to all domains in your organization.
279
307
280
-
Per-app VPN isn't supported on IKEv2. For more information, see [set up per-app VPN for iOS/iPadOS devices](vpn-setting-configure-per-app.md).
308
+
-**But only if this URL probe succeeds**: Optional. Enter a URL that the rule uses as a test. If the device accesses this URL without redirection, then the VPN connection is started. And, the device connects to the target URL. The user doesn't see the URL string probe site.
281
309
282
-
-**Provider Type**: Only available for Pulse Secure and Custom VPN.
283
-
- When using iOS/iPadOS **per-app VPN** profiles with Pulse Secure or a Custom VPN, choose app-layer tunneling (app-proxy) or packet-level tunneling (packet-tunnel). Set the **ProviderType** value to **app-proxy** for app-layer tunneling, or **packet-tunnel** for packet-layer tunneling. If you're not sure which value to use, check your VPN provider's documentation.
310
+
For example, a URL string probe is an auditing Web server URL that checks device compliance before connecting the VPN. Or, the URL tests the VPNs ability to connect to a site before the device connects to the target URL through the VPN.
284
311
285
-
-**Safari URLs that will trigger this VPN**: Add one or more web site URLs. When these URLs are visited using the Safari browser on the device, the VPN connection is automatically established.
312
+
-**Block users from disabling automatic VPN**: Your options:
286
313
287
-
-**Associated Domains**: Enter associated domains in the VPN profile to use with this VPN connection.
314
+
-**Not configured**: Intune doesn't change or update this setting.
315
+
-**Yes**: Prevents users from turning off automatic VPN. It forces users to keep the automatic VPN enabled and running.
316
+
-**No**: Allows users to turn off automatic VPN.
288
317
289
-
For more information, see [associated domains](device-features-configure.md#associated-domains).
318
+
This setting applies to:
290
319
291
-
-**Excluded Domains**: Enter domains that can bypass the VPN connection when per-app VPN is connected. For example, enter `contoso.com`. Traffic to the `contoso.com` domain will use the public Internet even if the VPN is connected.
320
+
- iOS 14 and newer
321
+
- iPadOS 14 and newer
292
322
293
-
-**Prevent users from disabling automatic VPN**: Your options:
323
+
-**Per-app VPN**: Enables per-app VPN by associating this VPN connection with a specific app. When the app runs, the VPN connection starts. You can associate the VPN profile with an app when you assign the app software or program. For more information, see [How to assign and monitor apps](../apps/apps-deploy.md).
294
324
295
-
-**Not configured**: Intune doesn't change or update this setting.
296
-
-**Yes**: Prevents users from turning off the Connect On Demand toggle within the VPN profile settings. It forces users to keep per-app VPN or on-demand rules enabled and running.
297
-
-**No**: Allows users to turn off the Connect On Demand toggle, which disables per-app VPN and on-demand rules.
325
+
Per-app VPN isn't supported on an IKEv2 connection. For more information, see [set up per-app VPN for iOS/iPadOS devices](vpn-setting-configure-per-app.md).
298
326
299
-
This setting applies to:
300
-
- iOS 14 and newer
301
-
- iPadOS 14 and newer
327
+
-**Provider Type**: Only available for Pulse Secure and Custom VPN.
328
+
329
+
When using **per-app VPN** profiles with Pulse Secure or a Custom VPN, choose app-layer tunneling (app-proxy) or packet-level tunneling (packet-tunnel):
330
+
331
+
-**app-proxy**: Select this option for app-layer tunneling.
332
+
-**packet-tunnel**: Select this option for packet-layer tunneling.
333
+
334
+
If you're not sure which option to use, then check your VPN provider's documentation.
335
+
336
+
-**Safari URLs that will trigger this VPN**: Add one or more web site URLs. When these URLs are visited using the Safari browser on the device, the VPN connection is automatically established. For example, enter `contoso.com`.
337
+
338
+
-**Associated Domains**: Enter associated domains in the VPN profile to use with this VPN connection.
339
+
340
+
For more information, see [associated domains](device-features-configure.md#associated-domains).
341
+
342
+
-**Excluded Domains**: Enter domains that can bypass the VPN connection when per-app VPN is connected. For example, enter `contoso.com`. Traffic to the `contoso.com` domain will use the public Internet even if the VPN is connected.
343
+
344
+
-**Block users from disabling automatic VPN**: Your options:
345
+
346
+
-**Not configured**: Intune doesn't change or update this setting.
347
+
-**Yes**: Prevents users from turning off the Connect On Demand toggle within the VPN profile settings. It forces users to keep per-app VPN or on-demand rules enabled and running.
348
+
-**No**: Allows users to turn off the Connect On Demand toggle, which disables per-app VPN and on-demand rules.
349
+
350
+
This setting applies to:
351
+
352
+
- iOS 14 and newer
353
+
- iPadOS 14 and newer
302
354
303
355
## Per-app VPN
304
356
305
-
These settings apply when you choose **Connection type** > **Microsoft Tunnel (standalone client) (preview)** or **Connection type** > **Microsoft Tunnel (preview)**.
357
+
These settings apply to the following VPN connection types:
-**Per-app VPN**: **Enable** associates a specific to this VPN connection. When the app runs, traffic automatically routes through the VPN connection. You can associate the VPN profile with an app when you assign the software. For more information, see [How to assign and monitor apps](../apps/apps-deploy.md).
364
+
-**Per-app VPN**: **Enable** associates a specific app to this VPN connection. When the app runs, traffic automatically routes through the VPN connection. You can associate the VPN profile with an app when you assign the software. For more information, see [How to assign and monitor apps](../apps/apps-deploy.md).
308
365
309
366
For more information, see [Microsoft Tunnel for Intune](../protect/microsoft-tunnel-overview.md).
310
367
368
+
-**Safari URLs that will trigger this VPN**: Add one or more web site URLs. When these URLs are visited using the Safari browser on the device, the VPN connection is automatically established. For example, enter `contoso.com`.
369
+
370
+
-**Associated Domains**: Enter associated domains in the VPN profile to use with this VPN connection.
371
+
372
+
For more information, see [associated domains](device-features-configure.md#associated-domains).
373
+
374
+
-**Excluded Domains**: Enter domains that can bypass the VPN connection when per-app VPN is connected. For example, enter `contoso.com`. Traffic to the `contoso.com` domain will use the public Internet even if the VPN is connected.
375
+
311
376
## Proxy
312
377
313
378
If you use a proxy, then configure the following settings.
@@ -318,6 +383,6 @@ If you use a proxy, then configure the following settings.
318
383
319
384
## Next steps
320
385
321
-
The profile is created, but may not doing anything yet. Be sure to [assign the profile](device-profile-assign.md) and [monitor its status](device-profile-monitor.md).
386
+
The profile is created, but may not be doing anything yet. Be sure to [assign the profile](device-profile-assign.md) and [monitor its status](device-profile-monitor.md).
322
387
323
388
Configure VPN settings on [Android](vpn-settings-android.md), [Android Enterprise](vpn-settings-android-enterprise.md), [macOS](vpn-settings-macos.md), and [Windows 10](vpn-settings-windows-10.md) devices.
0 commit comments