Skip to content

Commit e874d4b

Browse files
authored
Merge pull request #7576 from mestew/2205tpinit
init-CM2205tp
2 parents 1b695b1 + 7f70e21 commit e874d4b

11 files changed

Lines changed: 140 additions & 10 deletions

File tree

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
---
2+
author: mestew
3+
ms.author: mstewart
4+
ms.prod: configuration-manager
5+
ms.technology: configmgr-core
6+
ms.topic: include
7+
ms.date: 05/20/2022
8+
ms.localizationpriority: medium
9+
---
10+
11+
## <a name="bkmk_anchor"></a> Feature Name
12+
<!--CMADO#-->
13+
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
---
2+
author: mestew
3+
ms.author: mstewart
4+
ms.prod: configuration-manager
5+
ms.technology: configmgr-core
6+
ms.topic: include
7+
ms.date: 05/20/2022
8+
ms.localizationpriority: medium
9+
---
10+
11+
## <a name="bkmk_anchor"></a> Feature Name
12+
<!--CMADO#-->
13+
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
---
2+
author: mestew
3+
ms.author: mstewart
4+
ms.prod: configuration-manager
5+
ms.technology: configmgr-core
6+
ms.topic: include
7+
ms.date: 05/20/2022
8+
ms.localizationpriority: medium
9+
---
10+
11+
## <a name="bkmk_anchor"></a> Feature Name
12+
<!--CMADO#-->
13+
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
---
2+
author: mestew
3+
ms.author: mstewart
4+
ms.prod: configuration-manager
5+
ms.technology: configmgr-core
6+
ms.topic: include
7+
ms.date: 05/20/2022
8+
ms.localizationpriority: medium
9+
---
10+
11+
## <a name="bkmk_anchor"></a> Feature Name
12+
<!--CMADO#-->
13+
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
---
2+
author: mestew
3+
ms.author: mstewart
4+
ms.prod: configuration-manager
5+
ms.technology: configmgr-core
6+
ms.topic: include
7+
ms.date: 05/20/2022
8+
ms.localizationpriority: medium
9+
---
10+
11+
## <a name="bkmk_anchor"></a> Feature Name
12+
<!--CMADO#-->
13+
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
---
2+
author: mestew
3+
ms.author: mstewart
4+
ms.prod: configuration-manager
5+
ms.technology: configmgr-core
6+
ms.topic: include
7+
ms.date: 05/20/2022
8+
ms.localizationpriority: medium
9+
---
10+
11+
## <a name="bkmk_anchor"></a> Feature Name
12+
<!--CMADO#-->
13+
Lines changed: 41 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,41 @@
1+
---
2+
title: Technical preview 2205
3+
titleSuffix: Configuration Manager
4+
description: Learn about new features available in the Configuration Manager technical preview branch version 2205.
5+
ms.date: 05/20/2022
6+
ms.prod: configuration-manager
7+
ms.technology: configmgr-core
8+
ms.topic: conceptual
9+
author: mestew
10+
ms.author: mstewart
11+
manager: dougeby
12+
ms.localizationpriority: medium
13+
---
14+
15+
# Features in Configuration Manager technical preview version 2205
16+
17+
*Applies to: Configuration Manager (technical preview branch)*
18+
19+
This article introduces the features that are available in the technical preview for Configuration Manager, version 2205. Install this version to update and add new features to your technical preview site.<!-- baseline only statement: When you install a new technical preview site, this release is also available as a baseline version. -->
20+
21+
Review the [technical preview](../technical-preview.md) article before installing this update. That article familiarizes you with the general requirements and limitations for using a technical preview, how to update between versions, and how to provide feedback.
22+
23+
The following sections describe the new features to try out in this version:
24+
25+
<!-- [!INCLUDE [Example feature name](includes/2205/1234567.md)] -->
26+
27+
[!INCLUDE [3601042](includes/2205/3601042.md)]
28+
[!INCLUDE [3601127](includes/2205/3601127.md)]
29+
[!INCLUDE [9265511](includes/2205/9265511.md)]
30+
[!INCLUDE [13351390](includes/2205/13351390.md)]
31+
[!INCLUDE [14059872](includes/2205/14059872.md)]
32+
[!INCLUDE [14120481](includes/2205/14120481.md)]
33+
34+
<!-- ## General known issues -->
35+
36+
<!-- [!INCLUDE [11018755](includes/2112/known-issue-11018755.md)] -->
37+
## Next steps
38+
39+
For more information about installing or updating the technical preview branch, see [Technical preview](../technical-preview.md).
40+
41+
For more information about the different branches of Configuration Manager, see [Which branch of Configuration Manager should I use?](../../understand/which-branch-should-i-use.md).

memdocs/configmgr/core/get-started/technical-preview.md

Lines changed: 14 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Technical preview releases
33
titleSuffix: Configuration Manager
44
description: Learn about the technical preview branch to test-drive new functionality and capabilities in Configuration Manager.
5-
ms.date: 04/29/2022
5+
ms.date: 05/20/2022
66
ms.prod: configuration-manager
77
ms.technology: configmgr-core
88
ms.topic: conceptual
@@ -121,10 +121,15 @@ bullet format:
121121

122122
The following features are available with the most recent Configuration Manager technical preview version:
123123

124-
### Technical preview version 2204
124+
### Technical preview version 2205
125+
126+
- [3601042](2022/technical-preview-2205.md) <!--3601042-->
127+
- [3601127](2022/technical-preview-2205.md) <!--3601127-->
128+
- [9265511](2022/technical-preview-2205.md) <!--9265511-->
129+
- [13351390](2022/technical-preview-2205.md) <!--13351390-->
130+
- [14059872](2022/technical-preview-2205.md) <!--14059872-->
131+
- [14120481](2022/technical-preview-2205.md) <!--14120481-->
125132

126-
- [Administration Service Management option](2022/technical-preview-2204.md#bkmk_administration) <!--12952905-->
127-
- [Folders for automatic deployment rules (ADRs)](2022/technical-preview-2204.md#bkmk_folder) <!--13507410-->
128133

129134
> [!NOTE]
130135
> Features that were available in a previous version of the technical preview remain available in later versions. Similarly, features that are added to the Configuration Manager current branch remain available in the technical preview branch.
@@ -144,6 +149,11 @@ The following features were released with previous versions of the Configuration
144149
145150
<!-- ### Technical preview version 2111 -->
146151

152+
### Technical preview version 2204
153+
154+
- [Administration Service Management option](2022/technical-preview-2204.md#bkmk_administration) <!--12952905-->
155+
- [Folders for automatic deployment rules (ADRs)](2022/technical-preview-2204.md#bkmk_folder) <!--13507410-->
156+
147157
### Technical preview version 2203
148158

149159
- [Dark theme for the console](2022/technical-preview-2203.md#bkmk_dark) <!--9070525-->

memdocs/intune/apps/app-protection-policy-settings-ios.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ There are three categories of policy settings: *Data relocation*, *Access requir
4747
| Setting | How to use | Default value |
4848
|------|----------|-------|
4949
| **Backup Org data to iTunes and iCloud backups** | Select **Block** to prevent this app from backing up work or school data to iTunes and iCloud. Select **Allow** to allow this app to back up of work or school data to iTunes and iCloud. | **Allow** |
50-
| **Send Org data to other apps** | Specify what apps can receive data from this app: <ul><li>**All apps**: Allow transfer to any app. The receiving app will have the ability to read and edit the data.</li><li>**None**: Do not allow data transfer to any app, including other policy-managed apps. If the user performs a managed open-in function and transfers a document, the data will be encrypted and unreadable.</li><li> **Policy managed apps**: Allow transfer only to other policy-managed apps. <p><p>**Note:** _Users may be able to transfer content via Open-in or Share extensions to unmanaged apps on unenrolled devices or enrolled devices that allow sharing to unmanaged apps. Transferred data is encrypted by Intune and unreadable by unmanaged apps._</li><li> **Policy managed apps with OS sharing**: Only allow data transfer to other policy managed apps, as well as file transfers to other MDM managed apps on enrolled devices. <p><p>**Note:** _The **Policy managed apps with OS sharing** value is applicable to MDM enrolled devices only. If this setting is targeted to a user on an unenrolled device, the behavior of the **Policy managed apps** value applies. Users will be able to transfer unencrypted content via Open-in or Share extensions to any application allowed by the iOS MDM allowOpenFromManagedtoUnmanaged setting, assuming the sending app has the IntuneMAMUPN configured; for more information, see [How to manage data transfer between iOS apps in Microsoft Intune](data-transfer-between-apps-manage-ios.md). See https://developer.apple.com/business/documentation/Configuration-Profile-Reference.pdf for more information on this iOS/iPadOS MDM setting._<p><p></li><li>**Policy managed apps with Open-In/Share filtering**: Allow transfer only to other policy managed apps, and filter OS Open-in/Share dialogs to only display policy managed apps. To configure the filtering of the **Open-In/Share** dialog, it requires both the app(s) acting as the file/document source and the app(s) that can open this file/document to have the Intune SDK for iOS version 8.1.1 or above. <p><p>**Note:** _Users may be able to transfer content via Open-in or Share extensions to unmanaged apps if Intune private data type are supported by the app. Transferred data is encrypted by Intune and unreadable by unmanaged apps._</li></ul><br>In addition, when set to **Policy managed apps** or **None**, the Spotlight search (enables searching data within apps) and Siri shortcuts iOS features are blocked. <p><p>This policy can also apply to iOS/iPadOS Universal Links. General web links are managed by the **Open app links in Intune Managed Browser** policy setting. <p> There are some exempt apps and services to which Intune may allow data transfer by default. In addition, you can create your own exemptions if you need to allow data to transfer to an app that doesn't support Intune APP. See [data transfer exemptions](#data-transfer-exemptions) for more information. | **All apps** |
50+
| **Send Org data to other apps** | Specify what apps can receive data from this app: <ul><li>**All apps**: Allow transfer to any app. The receiving app will have the ability to read and edit the data.</li><li>**None**: Do not allow data transfer to any app, including other policy-managed apps. If the user performs a managed open-in function and transfers a document, the data will be encrypted and unreadable.</li><li> **Policy managed apps**: Allow transfer only to other policy-managed apps. <p><p>**Note:** _Users may be able to transfer content via Open-in or Share extensions to unmanaged apps on unenrolled devices or enrolled devices that allow sharing to unmanaged apps. Transferred data is encrypted by Intune and unreadable by unmanaged apps._</li><li> **Policy managed apps with OS sharing**: Only allow data transfer to other policy managed apps, as well as file transfers to other MDM managed apps on enrolled devices. <p><p>**Note:** _The **Policy managed apps with OS sharing** value is applicable to MDM enrolled devices only. If this setting is targeted to a user on an unenrolled device, the behavior of the **Policy managed apps** value applies. Users will be able to transfer unencrypted content via Open-in or Share extensions to any application allowed by the iOS MDM allowOpenFromManagedtoUnmanaged setting, assuming the sending app has the IntuneMAMUPN and IntuneMAMOID configured; for more information, see [How to manage data transfer between iOS apps in Microsoft Intune](data-transfer-between-apps-manage-ios.md). See https://developer.apple.com/business/documentation/Configuration-Profile-Reference.pdf for more information on this iOS/iPadOS MDM setting._<p><p></li><li>**Policy managed apps with Open-In/Share filtering**: Allow transfer only to other policy managed apps, and filter OS Open-in/Share dialogs to only display policy managed apps. To configure the filtering of the **Open-In/Share** dialog, it requires both the app(s) acting as the file/document source and the app(s) that can open this file/document to have the Intune SDK for iOS version 8.1.1 or above. <p><p>**Note:** _Users may be able to transfer content via Open-in or Share extensions to unmanaged apps if Intune private data type are supported by the app. Transferred data is encrypted by Intune and unreadable by unmanaged apps._</li></ul><br>In addition, when set to **Policy managed apps** or **None**, the Spotlight search (enables searching data within apps) and Siri shortcuts iOS features are blocked. <p><p>This policy can also apply to iOS/iPadOS Universal Links. General web links are managed by the **Open app links in Intune Managed Browser** policy setting. <p> There are some exempt apps and services to which Intune may allow data transfer by default. In addition, you can create your own exemptions if you need to allow data to transfer to an app that doesn't support Intune APP. See [data transfer exemptions](#data-transfer-exemptions) for more information. | **All apps** |
5151
| <ul>**Select apps to exempt** | This option is available when you select *Policy managed apps* for the previous option. | |
5252
| <ul>**Select universal links to exempt** | Specify which iOS/iPadOS [Universal Links](#universal-links) should open in the specified *unmanaged* application instead of the protected browser specified by the **Restrict web content transfer with other apps** setting. You must contact the application developer to determine the correct universal link format for each application. | |
5353
| <ul>**Select managed universal links** | Specify which iOS/iPadOS [Universal Links](#universal-links) should open in the specified *managed* application instead of the protected browser specified by the **Restrict web content transfer with other apps** setting. You must contact the application developer to determine the correct universal link format for each application. | |

memdocs/intune/apps/data-transfer-between-apps-manage-ios.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,8 @@ Configuring the user UPN setting is **required** for devices that are managed by
8686

8787
|Third-party MDM provider| Configuration Key | Value Type | Configuration Value|
8888
| ------- | ---- | ---- | ---- |
89-
|Microsoft Intune| IntuneMAMUPN | String | {{UserPrincipalName}}|
89+
|Microsoft Intune| IntuneMAMUPN | String | {{userprincipalname}}|
90+
|Microsoft Intune| IntuneMAMOID | String | {{userid}}|
9091
|VMware AirWatch| IntuneMAMUPN | String | {UserPrincipalName}|
9192
|MobileIron | IntuneMAMUPN | String | ${userUPN} **or** ${userEmailAddress} |
9293
|Citrix Endpoint Management | IntuneMAMUPN | String | ${user.userprincipalname} |

0 commit comments

Comments
 (0)