Skip to content

Commit dbad60a

Browse files
committed
erikre-doc-14567902 1.9
1 parent a4b0536 commit dbad60a

1 file changed

Lines changed: 0 additions & 179 deletions

File tree

memdocs/intune/fundamentals/in-development.md

Lines changed: 0 additions & 179 deletions
Original file line numberDiff line numberDiff line change
@@ -81,12 +81,6 @@ You will be able to select to include **Photo Library** as a supported applicati
8181
### Use App Protection Policies with Android Enterprise dedicated devices and Android (AOSP) devices<!-- 13819227 -->
8282
Intune-managed Android Enterprise dedicated devices enrolled with Azure Active Directory (Azure AD) shared mode and Android (AOSP) devices will be able to receive app protection policies policies and can be targeted separately from other Android device types. For more information about Android Enterprise dedicated devices and Android (AOSP), see [Android Enterprise dedicated devices](../fundamentals/deployment-guide-enrollment-android.md#android-enterprise-dedicated-devices) and [Android Open Source Project](../fundamentals/deployment-guide-enrollment-android.md#android-open-source-project).
8383

84-
### Push notification will always be sent when device ownership changes from Personal to Corporate<!-- 12390037 -->
85-
We’ll soon change push notification behavior to ensure a notification is always sent when an admin changes a device's ownership from Personal to Corporate. With this change, we’re removing the option to send a push notification to users when their device ownership type changes from personal to corporate (Android and iOS/iPadOS) in Microsoft Endpoint Manager admin center. Previously, admins were allowed to turn off this notification behavior. These notifications are pushed through the Company Portal app on Android and iOS/iPadOS devices.
86-
87-
### iOS Company Portal minimum required version<!-- 13016075 -->
88-
With an upcoming release of the MS Authenticator app, users will be required to update to v5.2205 of the iOS Company Portal. If you have enabled the **[Block installing apps using App Store](../configuration/device-restrictions-ios.md#settings-apply-to-automated-device-enrollment-supervised)** device restriction setting, you will likely need to push an update to the related devices that use this setting. Otherwise, no action is needed. If you have a helpdesk, you may want to make them aware of the prompt to update the Company Portal app. In most cases, users have app updates set to automatic, so they receive the updated Company Portal app without taking any action. Users that have an earlier app version will be prompted to update to the latest Company Portal app.
89-
9084
<!-- ***********************************************-->
9185

9286
## Device management
@@ -125,12 +119,6 @@ We’re changing what Intune displays when you view certificate details for devi
125119

126120
Today, the certificate reports can show certificates that are no longer valid, or that are no longer on a device. With this change, you’ll won't see information for those invalid certificates. Instead, Intune displays only those that are valid, that were revoked within the last 30 days, or that expired within the last 30 days will be shown.
127121

128-
### Support for Retire on Android Enterprise corporate-owned work-profiles devices<!-- 10216870 -->
129-
You'll be able to use the **Retire** admin action in the **Endpoint Manager admin center** to remove the work profile including all corporate apps, data, and policies from an Android Enterprise corporate-owned work profile device. Go to **Endpoint Manager admin center** >**Devices** pane >**All Devices** > then select the name of the device you want to retire and select **Retire**.
130-
131-
When you select **Retire**, the device is unenrolled from Intune management. However, all the data and apps associated with your personal profile will remain untouched on the device.
132-
For more information, see [Retire or wipe devices using Microsoft Intune](../remote-actions/devices-wipe.md).
133-
134122
### View a managed device's group membership<!-- 4100067 -->
135123
In the monitor section of the **Devices** workload of Intune, you'll be able to view the group membership of all AAD groups for a managed device. When this is available, you will be able to select **Group Membership** by signing in to [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) and selecting **Devices**.
136124

@@ -150,26 +138,6 @@ For more information about how bootstrap tokens work with Intune, see [Set up en
150138
### UI improvements when Android enrollment is available but not required<!-- 8764312 -->
151139
We're updating the iconography users see in the Company Portal for Android when *Device enrollment* for *End user experiences* on your Intune tenants *Customization* page is set to **Available, no prompts**. The changes will make it easier for users to recognize when enrollment is available to them, but not required.
152140

153-
### Enroll to co-management from Windows Autopilot<!-- 11300628 -->
154-
You'll be able to configure device enrollment in Intune to enable co-management, which happens during the [Windows Autopilot](../../autopilot/windows-autopilot.md) process. This behavior directs the workload authority in an orchestrated manner between Configuration Manager and Intune.
155-
156-
If the device is targeted with an [Autopilot enrollment status page (ESP) policy](../enrollment/windows-enrollment-status.md), the device will wait for Configuration Manager. The Configuration Manager client installs, registers with the site, and applies the production co-management policy. Then the Autopilot ESP continues.
157-
158-
### Improvements for enrollment profiles for Apple Automated Device Enrollment<!-- 13165752 -->
159-
Two Setup Assistant skip panes are becoming generally available for Apple Automated Device Enrollment (ADE). The screen configurations were previously released in Intune for public preview. The following screens will be generally available for both iOS/iPadOS and macOS under the **Setup Assistant** tab:
160-
161-
- iOS/iPadOS 13 and later
162-
- Pane name: **Get Started **
163-
- Default: Show pane
164-
- You can configure a setting in Intune that hides the Get Started pane in Setup Assistant during ADE enrollment.
165-
166-
- macOS 12 and later
167-
- Pane name: **Auto Unlock with Apple Watch**
168-
- Default: Show pane
169-
- You can configure a setting in Intune that hides the Unlock Your Mac with your Apple Watch pane in Setup Assistant during ADE enrollment.
170-
171-
There is no change to functionality from the previous public preview release.
172-
173141
<!-- ***********************************************-->
174142

175143
## Device configuration
@@ -799,131 +767,12 @@ To expand our support for the Android Open Source Project (AOSP) platform, you
799767
- Trusted certificate profile
800768
- PKCS certificate profile
801769

802-
803-
### New macOS settings in the Settings Catalog<!-- 13923348 -->
804-
The Settings Catalog has new macOS settings you can configure (**Devices** > **Configuration profiles** > **Create profile** > **macOS** for platform >**Settings catalog (preview)** for profile type):
805-
806-
**Accounts > Accounts**:
807-
808-
- Disable Guest Account
809-
- Enable Guest Account
810-
811-
**Accounts > Caldav**:
812-
813-
- Cal DAV Account Description
814-
- Cal DAV Host Name
815-
- Cal DAV Password
816-
- Cal DAV Port
817-
- Cal DAV Principal URL
818-
- Cal DAV Use SSL
819-
- Cal DAV Username
820-
821-
**Accounts > Carddav**:
822-
823-
- Card DAV Account Description
824-
- Card DAV Host Name
825-
- Card DAV Password
826-
- Card DAV Port
827-
- Card DAV Principal URL
828-
- Card DAV Use SSL
829-
- Card DAV Username
830-
831-
**Networking > Firewall**:
832-
833-
- Allow Signed
834-
- Allow Signed App
835-
- Enable Logging
836-
- Logging Option
837-
838-
**Parental Controls > Parental Controls Time Limits**:
839-
840-
- Family Controls Enabled
841-
- Time Limits
842-
843-
**Proxies > Network Proxy Configuration**:
844-
845-
- Proxies
846-
- Exceptions List
847-
- Fall Back Allowed
848-
- FTP Enable
849-
- FTP Passive
850-
- FTP Port
851-
- FTP Proxy
852-
- Gopher Enable
853-
- Gopher Port
854-
- Gopher Proxy
855-
- HTTP Enable
856-
- HTTP Port
857-
- HTTP Proxy
858-
- HTTPS Enable
859-
- HTTPS Port
860-
- HTTPS Proxy
861-
- Proxy Auto Config Enable
862-
- Proxy Auto Config URL String
863-
- Proxy Captive Login Allowed
864-
- RTSP Enable
865-
- RTSP Port
866-
- RTSP Proxy
867-
- SOCKS Enable
868-
- SOCKS Port Integer
869-
- SOCKS Proxy
870-
871-
**Security > Smart Card**:
872-
873-
- Allow Smart Card
874-
- Check Certificate Trust
875-
- Enforce Smart Card
876-
- One Card Per User
877-
- Token Removal Action
878-
- User Pairing
879-
880-
**Software Update**:
881-
882-
- Allow Pre Release Installation
883-
- Automatic Check Enabled
884-
- Automatic Download
885-
- Automatically Install App Updates
886-
- Automatically Install Mac OS Updates
887-
- Config Data Install
888-
- Critical Update Install
889-
- Restrict Software Update Require Admin To Install
890-
891-
**User Experience > Screensaver User**:
892-
893-
- Idle Time
894-
- Module Name
895-
- Module Path
896-
897-
There isn't any conflict resolution between policies created using the Settings catalog and policies created using Templates. When creating new policies in the Settings Catalog, be sure there are no conflicting settings with your current policies.
898-
899-
For more information about configuring Settings catalog profiles in Intune, see [Create a policy using settings catalog in Microsoft Intune](../configuration/settings-catalog.md).
900-
901-
Applies to:
902-
- macOS
903-
904770
### Create and deploy Wi-Fi profiles to Android AOSP devices<!-- 8506299 -->
905771
You'll be able to configure and deploy a Wi-Fi profile to your Android AOSP devices.
906772

907773
Applies to:
908774
- Android (AOSP)
909775

910-
### Unlock Android Enterprise devices after a set time using password, PIN, or pattern<!-- 7913163 -->
911-
On Android Enterprise devices, you can create a device restrictions configuration profile that manages device settings (**Devices** > **Configuration profiles** > **Create profile** > **Android Enterprise** > **Fully managed, dedicated, and corporate-owned work profile** for platform > **Device restrictions** for profile type).
912-
913-
There will be a new **How often pin, password, or pattern is needed to unlock** setting. Select how long users must unlock the device using a strong authentication method (password, PIN, or pattern). Your options:
914-
- **24 hours since last pin, password, or pattern unlock**: The screen locks 24 hours after users last used a strong authentication method to unlock the device or work profile.
915-
- **Device default** (default): The screen locks using the device's default time.
916-
917-
For a list of settings you can currently configure, go to [Android Enterprise device settings to allow or restrict features using Intune](../configuration/device-restrictions-android-for-work.md).
918-
919-
[2.3.4. Advanced passcode management](https://developers.google.com/android/work/requirements#2.3.-advanced-passcode-management_1) (opens Android's web site)
920-
921-
Applies to:
922-
- Android 8.0 and newer
923-
- Android Enterprise corporate owned fully managed (COBO)
924-
- Android Enterprise corporate owned dedicated devices (COSU)
925-
- Android Enterprise corporate owned work profile (COPE)
926-
927776
### Import custom ADMX and ADML administrative templates to create a device configuration profile<!-- 4970862 -->
928777
You can create a device configuration policy that uses built-in ADMX templates (**Devices** > **Configuration profiles** > **Create profile** > **Windows 10 and later** for platform > **Templates** > **Administrative templates**).
929778

@@ -935,16 +784,6 @@ Applies to:
935784
- Windows 11
936785
- Windows 10
937786

938-
### Use the Settings Catalog to create a Universal Print policy on Windows 11 devices<!-- 5513123 -->
939-
Many organizations are moving their printer infrastructure to the cloud. [Universal Print](/universal-print/fundamentals/universal-print-whatis) is a cloud-based printing solution for Microsoft 365 customers. It uses built-in cloud printers, built-in legacy printers, and runs entirely in Microsoft Azure. When Universal Print is deployed with Universal Print-compatible printers, it doesn't require any on-premises infrastructure.
940-
941-
In the Endpoint Manager admin center, you'll be able to use the Settings Catalog to create a printer policy (**Device configuration** > **Create profile** > **Windows 10 and later** for platform > **Settings catalog** for profile type > **Printer provisioning**). When you deploy the policy, users select the printer from a list of registered Universal Print printers, and can also select a default printer.
942-
943-
Currently, you must use the [Universal Print printer provisioning tool](/universal-print/fundamentals/universal-print-intune-tool), which requires more manual steps, and has some limitations.
944-
945-
Applies to:
946-
- Windows 11
947-
948787
<!-- ***********************************************-->
949788

950789
## Device security
@@ -971,24 +810,6 @@ Features of the reusable settings groups will include:
971810

972811
Reusable groups will be configured on a new Tab for *Reusable settings* that will be available when you view endpoint security Firewall policy. In the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) > **Endpoint security** > **Firewall**.
973812

974-
### New settings to manage removable devices for Endpoint security Device control profiles<!-- 8844611 -->
975-
We’re adding five new settings for Windows 10/11 to the [*device control* profile template](../protect/endpoint-security-asr-profile-settings.md#device-control) for Attack surface reduction policy in Endpoint Security. The new settings will help you manage the use of removable devices like a USB device, and to manage read and write access to removable disks like media players, cellular phones, displays, and CE devices.
976-
977-
The new settings include:
978-
- [ADMX_DeviceInstallation/DeviceInstall_Removable_Deny](/windows/client-management/mdm/policy-csp-admx-deviceinstallation?WT.mc_id=Portal-fx#admx-deviceinstallation-deviceinstall-removable-deny)
979-
- [ADMX_RemovableStorage/WPDDevices_DenyRead_Access_2](/windows/client-management/mdm/policy-csp-admx-removablestorage?WT.mc_id=Portal-fx#admx-removablestorage-wpddevices-denyread-access-2)
980-
- [ADMX_RemovableStorage/WPDDevices_DenyRead_Access_1](/windows/client-management/mdm/policy-csp-admx-removablestorage?WT.mc_id=Portal-fx#admx-removablestorage-wpddevices-denyread-access-1)
981-
- [ADMX_RemovableStorage/WPDDevices_DenyWrite_Access_2](/windows/client-management/mdm/policy-csp-admx-removablestorage?WT.mc_id=Portal-fx#admx-removablestorage-wpddevices-denywrite-access-2)
982-
- [ADMX_RemovableStorage/WPDDevices_DenyWrite_Access_1](/windows/client-management/mdm/policy-csp-admx-removablestorage?WT.mc_id=Portal-fx#admx-removablestorage-wpddevices-denywrite-access-1)
983-
984-
985-
### Microsoft Defender for Endpoint as the Tunnel client app for iOS will soon be out of Preview<!-- 9849514 -->
986-
The preview version of Microsoft Defender for Endpoint that supports [Microsoft Tunnel](../protect/microsoft-tunnel-overview.md) on iOS/iPadOS will soon be out of preview and become generally available.
987-
988-
When the Microsoft Defender for Endpoint app with support for Microsoft Tunnel becomes generally available for iOS, the standalone tunnel client app for iOS will be deprecated with support ending 60 days later.
989-
990-
If you are using the standalone tunnel app for iOS, prepare for this change by planning to [migrate to the Microsoft Defender for Endpoint app](../protect/microsoft-tunnel-migrate-app.md) before support for the standalone app ends.
991-
992813
## Monitor and troubleshoot
993814

994815
### Use Collect diagnostics to collect details about Windows expedited updates<!-- 14337387 -->

0 commit comments

Comments
 (0)