You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: memdocs/intune/fundamentals/whats-new.md
+210-3Lines changed: 210 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ keywords:
7
7
author: Erikre
8
8
ms.author: erikre
9
9
manager: dougeby
10
-
ms.date: 05/12/2022
10
+
ms.date: 05/31/2022
11
11
ms.topic: conceptual
12
12
ms.service: microsoft-intune
13
13
ms.subservice: fundamentals
@@ -60,6 +60,213 @@ You can use RSS to be notified when this page is updated. For more information,
60
60
### Scripts
61
61
-->
62
62
63
+
## Week of May 30, 2022 (Service release 2205)
64
+
65
+
### App management
66
+
67
+
#### Push notifications are automatically sent when device ownership changes from Personal to Corporate<!-- 12390037 -->
68
+
For iOS/iPad and Android devices, a push notification is now automatically sent when a device's [ownership type is changed from Personal to Corporate](../enrollment/corporate-identifiers-add.md#change-device-ownership). The notification is pushed through the Company Portal app on the device.
69
+
70
+
With this change, we've removed the Company Portal configuration setting that was previously used to manage this notification behavior.
71
+
72
+
#### iOS/iPadOS notifications require March Company Portal or newer<!-- 14131757 -->
73
+
With Intune's May (2205) service release, we have made service side updates to iOS/iPadOS notifications that require users to have the March Company Portal app (version 5.2203.0) or newer. If you are using functionality that could generate iOS/iPadOS Company Portal push notifications, you must ensure your users update the iOS/iPadOS Company Portal to continue receiving push notifications. There is no additional change in functionality. For related information, see [Update the Company Portal app](../user-help/install-a-new-version-of-the-company-portal-app.md).
74
+
75
+
#### Deployment of macOS LOB apps by uploading PKG-type installer files is now generally available<!-- 10671861 -->
76
+
You can now deploy macOS line-of-business (LOB) apps by uploading PKG-type installer files to Intune. This capability is out of public preview and is now generally available.
77
+
78
+
To add a macOS LOB app from [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Apps** > **macOS** > **Add** > **Line-of-business app**. Additionally, the App Wrapping Tool for macOS will no longer be required to deploy macOS LOB apps. For related information, see [How to add macOS line-of-business (LOB) apps to Microsoft Intune](../apps/lob-apps-macos.md).
79
+
80
+
#### Improved report experience on the Managed Apps pane<!-- 10147133 -->
81
+
The **Managed Apps** pane has been updated to better display managed app details for a device. You can switch between displaying managed app details for the primary user and other users on a device, or display app details for the device without any user. The generated app details will be displayed using the primary user of the device when the report is initially loaded, or displayed with no primary user if none exists. For more information, see [Managed Apps report](../fundamentals/reports.md#managed-apps-report-organizational).
82
+
83
+
#### MSfB licenses and Apple VPP licenses<!-- 10742713a -->
84
+
Removing an Intune license from a user will no longer revoke app licenses granted through the Microsoft Store for Business or through Apple VPP. For related information, see [How to manage volume purchased apps from the Microsoft Store for Business with Microsoft Intune](../apps/windows-store-for-business.md), [Revoking iOS app licenses](../apps/vpp-apps-ios.md#revoking-app-licenses), and [Microsoft Intune licensing](../fundamentals/licenses.md).
85
+
86
+
#### Reporting for unlicensed users<!-- 10742713b -->
87
+
Intune will no longer remove users from all Intune reports when they are unlicensed. Until the user is deleted from Azure AD, Intune will continue to report the user in most common scenarios. For related information about reporting, see [Intune reports](../fundamentals/reports.md).
88
+
89
+
### Device security
90
+
91
+
#### New Device Control profile for Intune’s endpoint security Attack Surface Reduction policy<!-- 8844611 -->
92
+
As part of the continuing [rollout of new profiles for endpoint security policies](#new-profile-templates-and-settings-structure-for-endpoint-security-policies), which began in April 2022, we’ve released a new Device Control profile template for [Attack Surface Reduction](../protect/endpoint-security-asr-policy.md) policy for endpoint security in Intune. This profile replaces the previous profile of the same name for the *Windows 10 and later* platform.
93
+
94
+
With this replacement, only instances of the new profile can be created. However, any profiles you’ve previously created that use the old profile structure remain available to use, edit, and deploy.
95
+
96
+
The new Device Control profile:
97
+
- Includes all the settings that were available in the original profile.
98
+
- Introduces five new settings that are not available in the older profile.
99
+
100
+
The five new settings focus on removable devices, like USB devices:
101
+
-[Prevent installation of removable devices](/windows/client-management/mdm/policy-csp-admx-deviceinstallation?WT.mc_id=Portal-fx#admx-deviceinstallation-deviceinstall-removable-deny)
#### Unlock Android Enterprise devices after a set time using password, PIN, or pattern<!-- 7913163 -->
110
+
On Android Enterprise devices, you can create a device restrictions configuration profile that manages device settings (**Devices** > **Configuration profiles** > **Create profile** > **Android Enterprise** > **Fully managed, dedicated, and corporate-owned work profile** for platform > **Device restrictions** for profile type).
111
+
112
+
In **Device password** and **Work profile password**, there's a new **Required unlock frequency** setting. Select how long users must unlock the device using a strong authentication method (password, PIN, or pattern). Your options:
113
+
114
+
-**24 hours since last pin, password, or pattern unlock**: The screen locks 24 hours after users last used a strong authentication method to unlock the device or work profile.
115
+
-**Device default** (default): The screen locks using the device's default time.
116
+
117
+
[2.3.4. Advanced passcode management](https://developers.google.com/android/work/requirements#2.3.-advanced-passcode-management_1) (opens Android's web site)
118
+
119
+
For a list of the settings you can configure, go to [Android Enterprise device settings to allow or restrict features using Intune](../configuration/device-restrictions-android-for-work.md).
- Android Enterprise corporate owned work profile (COPE)
126
+
127
+
#### Use the Settings Catalog to create a Universal Print policy on Windows 11 devices<!-- 5513123 -->
128
+
Many organizations are moving their printer infrastructure to the cloud using [Universal Print](/universal-print/fundamentals/universal-print-whatis).
129
+
130
+
In the Endpoint Manager admin center, you can use the Settings Catalog to create a universal print policy (**Device configuration** > **Create profile** > **Windows 10 and later** for platform > **Settings catalog** for profile type > **Printer provisioning**). When you deploy the policy, users select the printer from a list of registered Universal Print printers.
131
+
132
+
For more information, go to [Create a Universal Print policy in Microsoft Intune](../configuration/settings-catalog-printer-provisioning.md).
133
+
134
+
Applies to:
135
+
- Windows 11
136
+
137
+
#### New macOS settings in the Settings Catalog<!-- 13923348 -->
138
+
The Settings Catalog has new macOS settings you can configure (**Devices** > **Configuration profiles** > **Create profile** > **macOS** for platform >**Settings catalog (preview)** for profile type):
139
+
140
+
**Accounts > Accounts**:
141
+
- Disable Guest Account
142
+
- Enable Guest Account
143
+
144
+
**Networking > Firewall**:
145
+
- Allow Signed
146
+
- Allow Signed App
147
+
- Enable Logging
148
+
- Logging Option
149
+
150
+
**Parental Controls > Parental Controls Time Limits**:
151
+
- Family Controls Enabled
152
+
- Time Limits
153
+
154
+
**Proxies > Network Proxy Configuration**:
155
+
- Proxies
156
+
- Exceptions List
157
+
- Fall Back Allowed
158
+
- FTP Enable
159
+
- FTP Passive
160
+
- FTP Port
161
+
- FTP Proxy
162
+
- Gopher Enable
163
+
- Gopher Port
164
+
- Gopher Proxy
165
+
- HTTP Enable
166
+
- HTTP Port
167
+
- HTTP Proxy
168
+
- HTTPS Enable
169
+
- HTTPS Port
170
+
- HTTPS Proxy
171
+
- Proxy Auto Config Enable
172
+
- Proxy Auto Config URL String
173
+
- Proxy Captive Login Allowed
174
+
- RTSP Enable
175
+
- RTSP Port
176
+
- RTSP Proxy
177
+
- SOCKS Enable
178
+
- SOCKS Port Integer
179
+
- SOCKS Proxy
180
+
181
+
**Security > Smart Card**:
182
+
- Allow Smart Card
183
+
- Check Certificate Trust
184
+
- Enforce Smart Card
185
+
- One Card Per User
186
+
- Token Removal Action
187
+
- User Pairing
188
+
189
+
**Software Update**:
190
+
- Allow Pre Release Installation
191
+
- Automatic Check Enabled
192
+
- Automatic Download
193
+
- Automatically Install App Updates
194
+
- Automatically Install Mac OS Updates
195
+
- Config Data Install
196
+
- Critical Update Install
197
+
- Restrict Software Update Require Admin To Install
198
+
199
+
**User Experience > Screensaver User**:
200
+
- Idle Time
201
+
- Module Name
202
+
- Module Path
203
+
204
+
There isn't any conflict resolution between policies created using the Settings catalog and policies created using Templates. When creating new policies in the Settings Catalog, be sure there are no conflicting settings with your current policies.
205
+
206
+
For more information about configuring Settings catalog profiles in Intune, see [Create a policy using settings catalog in Microsoft Intune](../configuration/settings-catalog.md).
207
+
208
+
Applies to:
209
+
- macOS
210
+
211
+
### Intune apps
212
+
213
+
#### Newly available protected apps for Intune<!-- 13867257, 13867471, 13922181, 13983022, 14064381, 14121805 -->
214
+
The following protected apps are now available for Microsoft Intune:
215
+
216
+
- F2 Manager Intune by cBrain A/S
217
+
- F2 Touch Intune (Android) by cBrain A/S
218
+
- Microsoft Lists (Android) by Microsoft
219
+
- Microsoft Lens - PDF Scanner by Microsoft
220
+
- Diligent Boards by Diligent Corporation
221
+
- Secure Contacts by Provectus Technologies GmbH
222
+
- My Portal by MangoApps by MangoSpring Inc
223
+
224
+
For more information about protected apps, see [Microsoft Intune protected apps](../apps/apps-supported-intune-apps.md).
There's a new **Software updates** page for tenant attached devices. This page displays the status for software updates on a device. You can review which updates are successfully installed, failed, and are assigned but not yet installed. Using the timestamp for the update status assists with troubleshooting.
230
+
231
+
#### Microsoft Defender for Endpoint support for App Sync on iOS/iPadOS<!-- 9768396 -->
232
+
When you use Microsoft Defender for Endpoint (MDE) as your Mobile Threat Defense application, you can [configure MDE to request Application Inventory data](../protect/advanced-threat-protection-configure.md#enable-microsoft-defender-for-endpoint-in-intune) from Intune from iOS/iPadOS devices. The following two settings are now available:
233
+
234
+
-**Enable App Sync for iOS Devices**: Set to **On** to allow MDE to request metadata of iOS applications from Intune to use for threat analysis purposes. The iOS device must be MDM-enrolled and will provide updated app data during device check-in.
235
+
236
+
-**Send full application inventory data on personally-owned iOS/iPadOS Devices**: This setting controls the application inventory data that Intune shares with MDE when MDE syncs app data and requests the app inventory list.
237
+
238
+
When set to **On**, MDE can request a list of applications from Intune for personally-owned iOS/iPadOS devices. This includes unmanaged apps as well as apps that were deployed through Intune.
239
+
240
+
When set to **Off**, data about unmanaged apps isn’t provided. Intune does share data for the apps that were deployed through Intune.
241
+
242
+
#### Support for Retire on Android Enterprise corporate-owned work-profiles devices<!-- 10216870 -->
243
+
You can now use the **Retire** admin action in the **Microsoft Endpoint Manager admin center** to remove the work profile including all corporate apps, data, and policies from an Android Enterprise corporate-owned work profile device. Go to **Endpoint Manager admin center** > **Devices** pane > **All Devices** > then select the name of the device you want to retire and select **Retire**.
244
+
245
+
When you select **Retire**, the device is unenrolled from Intune management. However, all the data and apps associated with your personal profile will remain untouched on the device.
246
+
For more information, see [Retire or wipe devices using Microsoft Intune](../remote-actions/devices-wipe.md).
247
+
248
+
### Device enrollment
249
+
250
+
#### Improvements for enrollment profiles for Apple Automated Device Enrollment<!-- 13165752 -->
251
+
Two Setup Assistant skip panes, previously released in Intune for public preview, are now generally available to use in Intune. These screens typically appear in Setup Assistant during Apple Automated Device Enrollment (ADE). You can configure screen visibility while you're setting up an enrollment profile in Intune. Intune-supported screen settings are available in the device enrollment profile under the **Setup Assistant** tab. The new skip panes are:
252
+
253
+
- Pane name: **Get Started**
254
+
- Available for iOS/iPadOS 13 and later.
255
+
- This pane is visible in Setup Assistant during ADE by default.
256
+
257
+
- Pane name: **Auto Unlock with Apple Watch**
258
+
- Available for macOS 12 and later.
259
+
- This pane is visible in Setup Assistant during ADE by default.
260
+
261
+
There is no change to functionality from the public preview release.
262
+
263
+
#### Enroll to co-management from Windows Autopilot<!-- 11300628 -->
264
+
You can configure device enrollment in Intune to enable co-management, which happens during the [Windows Autopilot](../../autopilot/windows-autopilot.md) process. This behavior directs the workload authority in an orchestrated manner between Configuration Manager and Intune.
265
+
266
+
If the device is targeted with an [Autopilot enrollment status page (ESP) policy](../enrollment/windows-enrollment-status.md), the device will wait for Configuration Manager. The Configuration Manager client installs, registers with the site, and applies the production co-management policy. Then the Autopilot ESP continues.
267
+
268
+
For more information, see [How to enroll to co-management with Autopilot](../../configmgr/comanage/autopilot-enrollment.md).
269
+
63
270
## Week of May 9, 2022
64
271
65
272
### Device security
@@ -98,7 +305,7 @@ The **App configuration policies** list has been modified in Intune. This list w
98
305
99
306
#### Password complexity for Android devices<!-- 9321870 -->
100
307
The **Require device lock** setting in Intune has been extended to include values (**Low Complexity**, **Medium Complexity**, and **High Complexity**). If the device lock doesn’t meet the minimum password requirement, you can **warn**, **wipe data**, or **block** the end user from accessing a managed account in a managed app. This feature targets devices that operate on Android 11+. For devices operating on Android 11 and earlier, setting a complexity value of **Low**, **Medium**, or **High** will default to the expected behavior for **Low Complexity**. For related information, see [Android app protection policy settings in Microsoft Intune](..\apps\app-protection-policy-settings-android.md).
101
-
308
+
management
102
309
### Improvements to Win32 App Log collection<!-- 9978316 -->
103
310
Win32 App Log collection via Intune Management Extension has moved to the Windows 10 device diagnostic platform, reducing time to collect logs from 1-2 hours to 15 minutes. We've also increased the log size from 60mb to 250mb. Along with performance improvements, the app logs are available under the **Device diagnostics monitor** action for each device, as well as the managed app monitor. For information about how to collect diagnostics, see [Collect diagnostics from a Windows device](..\remote-actions\collect-diagnostics.md) and [Troubleshooting Win32 app installations with Intune](/troubleshoot/mem/intune/troubleshoot-win32-app-install).
104
311
@@ -623,7 +830,7 @@ For more information on these policy types, see:
623
830
Applies to:
624
831
- Windows 10/11
625
832
626
-
#### New macOS settings in the Settings Catalog<!-- 13111526 idready idstaged wnready -->
833
+
#### New macOS settings in the Settings Catalog<!-- 13111526 -->
627
834
The Settings Catalog has new macOS settings you can configure (**Devices** > **Configuration profiles** > **Create profile** > **macOS** for platform >**Settings catalog (preview)** for profile type):
0 commit comments