You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: memdocs/get-support.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ keywords:
8
8
author: brenduns
9
9
ms.author: brenduns
10
10
manager: dougeby
11
-
ms.date: 09/27/2021
11
+
ms.date: 12/01/2021
12
12
ms.topic: how-to
13
13
ms.service: mem
14
14
ms.subservice: fundamentals
@@ -35,7 +35,7 @@ Microsoft provides global technical, pre-sales, billing, and subscription suppor
35
35
36
36
Support is available both online and by phone for paid and trial subscriptions. Online technical support is available in English and Japanese. Phone support and online billing support are available in additional languages.
37
37
38
-
With administrative access to the admin center, you can use the **Help and Support** option to file an on-line support ticket for a supported service. To create and manage a support incident, your account must have an Azure Active Directory (Azure AD) role that includes the *action***microsoft.office365.supportTickets**. For information about Azure AD roles and permissions that are required to create a support ticket, see [administrator roles in Azure Active Directory](/azure/active-directory/active-directory-assign-admin-roles-azure-portal).
38
+
With administrative access to the admin center, you can use the **Help and Support** option to file an on-line support ticket for a supported service. To create and manage a support incident, your account must have an Azure Active Directory (Azure AD) role that includes the *action***microsoft.office365.supportTickets**. Guest users are an exception. They can't file support tickets, even when granted the correct action. For information about Azure AD roles and permissions that are required to create a support ticket, see [administrator roles in Azure Active Directory](/azure/active-directory/active-directory-assign-admin-roles-azure-portal).
39
39
40
40
> [!IMPORTANT]
41
41
> For technical support with third-party products that work with Intune (like Saaswedo, Cisco, or Lookout), contact the supplier of that product first. Before you open a request with Intune support, make sure you configured the other product correctly.
Copy file name to clipboardExpand all lines: memdocs/intune/fundamentals/in-development.md
+99-7Lines changed: 99 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ keywords:
8
8
author: dougeby
9
9
ms.author: dougeby
10
10
manager: dougeby
11
-
ms.date: 11/19/2021
11
+
ms.date: 12/01/2021
12
12
ms.topic: conceptual
13
13
ms.service: microsoft-intune
14
14
ms.subservice: fundamentals
@@ -66,19 +66,109 @@ You can use RSS to be notified when this page is updated. For more information,
66
66
67
67
## App management
68
68
69
-
### New privacy consent screen during Company Portal installation <!--6600502-->
70
-
People installing the Company Portal app for the first time from certain app stores, such as those in China, may see a new privacy consent screen during installation. The screen explains what information Microsoft collects and how it's used. Users must agree to the terms before they can use the app. Users who installed Company Portal prior to this release will not see the new screen.
69
+
### Device compliance status in Company Portal website<!--8782968-->
70
+
End users will be able to more easily see the compliance status of their devices from the Company Portal website. End users can navigate to the [Company Portal](https://portal.manage.microsoft.com/devices) website and select the **Devices** page to see device status. Devices will be listed with a status of **Can access company resources**, **Checking access**, or **Can't access company resources**. For related information, see [Manage apps from the Company Portal website](../user-help/manage-apps-cpweb.md) and [How to configure the Intune Company Portal apps, Company Portal website, and Intune app](../apps/company-portal-app.md).
71
71
72
72
### Password complexity for Android devices<!-- 9321870 -->
73
73
The **Require device lock** setting in Intune will be extended to include values (**Low Complexity**, **Medium Complexity**, and **High Complexity**). If the device lock doesn’t meet the minimum password requirement, you will be able to **warn**, **wipe data**, or **block** the end user from accessing a managed account in a managed app. This feature targets devices that operate on Android 11+. For devices operating on Android 10 and earlier, setting a complexity value of **Low**, **Medium**, or **High** will default to the expected behavior for **Low Complexity**. For related information, see [Android app protection policy settings in Microsoft Intune](..\apps\app-protection-policy-settings-android.md).
74
74
75
75
### Unified delivery of Azure AD Enterprise and Office Online applications in the Android Company Portal<!-- 1817862 -->
76
76
77
-
Last year, we announced [Unified delivery of Azure AD Enterprise and Office Online applications in the Company Portal website](../fundamentals/whats-new-archive.md#unified-delivery-of-azure-ad-enterprise-and-office-online-applications-in-the-windows-company-portal). This feature will be supported for users who get their apps directly from the Android Company Portal. On the **Customization** pane of Intune, select to **Hide** or **Show** both **Azure AD Enterprise applications** and **Office Online applications** in the Company Portal. Each end user will see their entire application catalog from the chosen Microsoft service. By default, each additional app source will be set to **Hide**. In the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), select **Tenant administration** > **Customization** to find this configuration setting. For related information, see [How to customize the Intune Company Portal apps, Company Portal website, and Intune app](../apps/company-portal-app.md).
### BlackBerry Cylance – New Mobile Threat Defense partner<!-- 7822722 IDready -->
82
+
You’ll soon be able to use [BlackBerry’s Cylance AI](https://www.blackberry.com/us/en/products/unified-endpoint-security/cylance-ai) offering as an integrated Mobile Threat Defense (MTD) partner with Intune to control mobile device access to corporate resources using Conditional Access based on risk assessment.
83
+
84
+
For more information about MTD partners for Intune, see [Mobile Threat Defense integration with Intune](../protect/mobile-threat-defense.md).
### New option to see the number of profiles with an error or conflict in device configuration profiles<!-- 9142810 -->
91
+
In the Endpoint Manager admin center, there's a new option that states something like "X policies with error or conflict". When you select this option, you automatically go to the **Devices** > **Monitor** > **Assignment Failures** report. This report helps you troubleshoot errors and conflicts.
92
+
93
+
This new option is available in the following locations in the Endpoint Manager admin center:
94
+
- Home page
95
+
- Dashboard
96
+
-**Devices** > **Configuration profiles**: When you select a Windows profile, the **Overview** summary page shows this option.
97
+
98
+
For more information, see [Monitor device profiles in Microsoft Intune](../configuration/device-profile-monitor.md) and [Assignment failures report](reports.md#assignment-failures-report-operational).
99
+
100
+
Applies to:
101
+
- Windows 10 and newer
102
+
103
+
### New Timeout and Block iCloud Private Relay settings for iOS/iPadOS and macOS devices<!-- 10370284 -->
104
+
On iOS/iPadOS and macOS devices, you can create a device restrictions policy that manages features on the device (**Devices** > **Configuration Profiles** > **Create profile** > **iOS/iPadOS** or **macOS** for platform > **Device restrictions**).
105
+
106
+
There are new settings:
107
+
- iOS/iPadOS:
108
+
-**Block iCloud Private Relay**: On supervised devices, this setting prevents users from using the [iCloud Private Relay](https://support.apple.com/HT212614) (opens Apple's web site).
109
+
- macOS:
110
+
-**Block iCloud Private Relay**: On supervised devices, this setting prevents users from using the [iCloud Private Relay](https://support.apple.com/HT212614) (opens Apple's web site).
111
+
-**Timeout**: Users can unlock their devices using a Touch ID, such as a fingerprint. Use this setting to require users to enter their password after a period of inactivity. The default inactivity period is is 48 hours. After 48 hours of inactivity, the device prompts for the password, instead of Touch ID.
112
+
113
+
Applies to:
114
+
- iOS/iPadOS 15 and newer
115
+
- macOS 12 and newer
116
+
117
+
### New device restrictions settings for Android Enterprise corporate-owned devices with a work profile<!-- 10982232 -->
118
+
On Android Enterprise devices, you can configure settings that control features on devices (**Devices** > **Configuration Profiles** > **Create profile** > **Android Enterprise** for platform > **Device restrictions** for profile type).
119
+
120
+
For Android Enterprise corporate-owned devices with a work profile, there are new settings:
121
+
- Restrict searching work contacts and displaying work contact caller-ID in personal profile
122
+
- Restrict copy and paste between work and personal profiles
123
+
- Restrict data sharing between work and personal profiles
124
+
125
+
For more information on the settings you can currently configure, see [Android Enterprise device settings to allow or restrict features using Intune](../configuration/device-restrictions-android-for-work.md).
126
+
127
+
Applies to:
128
+
- Android Enterprise corporate-owned work profile (COPE)
129
+
130
+
### Settings Catalog will soon be supported on U.S. Government GCC High and DoD<!-- 12389409 -->
131
+
Settings Catalog will soon be available and supported on U.S. Government GCC High and DoD.
132
+
133
+
For more information on Settings Catalog, and what it is, see [Use the settings catalog to configure settings on Windows and macOS devices](../configuration/settings-catalog.md).
134
+
135
+
Applies to:
136
+
- macOS
137
+
- Windows 10 and newer
138
+
139
+
### Enter the certificate common name in Wi-Fi profiles for Android Enterprise fully managed, dedicated, and corporate-owned work profile devices<!-- 12439458 -->
140
+
On Android Enterprise devices, you can create a Wi-Fi profile that configures enterprise Wi-Fi settings (**Devices** > **Configuration Profiles** > **Create profile** > **Android Enterprise** for platform > **Fully Managed, Dedicated, and Corporate-Owned Work Profile** > **Wi-Fi** for profile type).
141
+
142
+
When you select **Enterprise**, there's a new **Server names** setting. This setting is the DNS name used in the certificate presented by the Radius Server during client authentication to the Wi-Fi access point. For example, enter `Contoso.com`, `uk.contoso.com`, or `jp.contoso.com`.
143
+
144
+
If you have multiple Radius servers with the same DNS suffix in their fully qualified domain name, then you can enter only the suffix. For example, you can enter `contoso.com`.
145
+
146
+
When you enter this value, user devices can bypass the dynamic trust dialog that's sometimes shown when connecting to the Wi-Fi network.
147
+
148
+
**What you need to know**:
149
+
- New Wi-Fi profiles targeting Android 11 or later may require this setting to be configured. Otherwise, the devices may not connect to your Wi-Fi network.
150
+
151
+
For more information on the settings you can currently configure, see [Android Enterprise Fully Managed, Dedicated, and Corporate-Owned Work Profile Wi-Fi settings](../configuration/wi-fi-settings-android-enterprise.md#fully-managed-dedicated-and-corporate-owned-work-profile).
152
+
153
+
Applies to:
154
+
- Android Enterprise corporate-owned work profile (COPE)
### New Administrative Templates settings for Microsoft Edge 96 and Microsoft Edge updater on Windows devices<!-- 12426698 -->
159
+
In Intune, you can use Administrative Templates to configure Microsoft Edge settings (**Devices** > **Configuration profiles** > **Create profile** > **Windows 10 and later** for platform > **Templates** > **Administrative Templates** for profile type).
160
+
161
+
There are new Administrative Templates settings for Microsoft Edge 96 and the Microsoft Edge updater, including **Target Channel override** support. Use **Target Channel override** so users get the **Extended Stable** release cycle option, which can be set using Group Policy or through Intune.
162
+
163
+
For related information, see:
164
+
-[Configure Microsoft Edge policy settings in Microsoft Intune](../configuration/administrative-templates-configure-edge.md)
165
+
-[Overview of the Microsoft Edge channels](/deployedge/microsoft-edge-channels)
### Use filters to assign Endpoint analytics proactive remediations scripts and Endpoint Security policies in Endpoint Manager admin center - public preview<!-- 7566953 7591178 -->
83
173
84
174
In the Endpoint Manager admin center, you can create filters, and then use these filters when assigning apps and policies. You'll be able to use filters to assign the following policies:
@@ -100,13 +190,15 @@ Applies to:
100
190
101
191
Filters allows you to include or exclude devices in policy or app assignments based on different device properties. When you create an Enrollment Status Page (ESP) profile, you'll be able to use filters when assigning the profile. The **All users** and **All devices** assignment options will also be available. You will be able to find this setting in [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431) by selecting **Devices** > **Enroll devices** > **Enrollment Status Page** > **Create**. For more information about filters, see [Use filters when assigning your apps, policies, and profiles](../fundamentals/filters.md). For more information about ESP profiles, see [Set up the Enrollment Status Page](../enrollment/windows-enrollment-status.md).
102
192
103
-
### Filter enrollment restriction assignments by device type <!-- 9284419 -->
104
-
105
-
New assignment filters in **Enrollment Restrictions** will let you include or exclude restrictions based on device type. For example, you can allow personal devices, while blocking Windows 10 Home devices, by applying the **OSVersion** assignment filter. These filters will be released for public preview and supported for Windows and Apple devices, with Android support coming at a later date. For more information about how to use filters, see [Create a filter](../fundamentals/filters.md).
193
+
### Use filters on device type enrollment restrictions for Windows and Apple enrollments<!-- 9284419 -->
194
+
New assignment filters in Enrollment Restrictions will let you include or exclude restrictions based on device type. For example, you can allow personal devices, while blocking Windows 10 Home devices, by applying the operatingSystemSKU assignment filter. These filters will be released for public preview with a new configuration experience for enrollment restrictions and supported for Windows and Apple devices, with Android support coming at a later date. For more information about how to use filters, see [Create a filter](../fundamentals/filters.md).
106
195
107
196
<!-- vvvvvvvvvvvvvvvvvvvvvv -->
108
197
## Monitor and troubleshoot
109
198
199
+
### Adding event viewer for Windows 10 diagnostics<!-- 10741116 -->
200
+
We're adding a new event viewer to Windows 10 device diagnostics called Microsoft-Windows-Windows Firewall with Advanced Security/Firewall. The event viewer will assist you in troubleshooting issues with the firewall.
201
+
110
202
### Account protection policy changes in Endpoint security<!-- 7492116 -->
111
203
112
204
We’re reworking the endpoint security Account protection policy to use the new APIs for Windows Hello for Business. The new APIs will result in a more consistent experience. The new API is *./Device/Vendor/MSFT/PassportForWork*, which includes more options that can help reduce conflicts. This API replaces the use of *./User/Vendor/MSFT/PassportForWork*. (**Endpoint security** > **Account protection**)
0 commit comments