Skip to content

Commit f4ca014

Browse files
authored
Update whats-new.md
1 parent ec13ee3 commit f4ca014

1 file changed

Lines changed: 11 additions & 1 deletion

File tree

memdocs/intune/fundamentals/whats-new.md

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -202,7 +202,17 @@ Users with the correct permissions can view keys by going to **Devices** > **Win
202202
This capability is supported with Configuration Manager sites that run version 2107 or later. For sites that run version 2107, you’ll need to install an update rollup to support Azure AD joined devices. For more information, see [KB11121541](../../configmgr/hotfix/2107/11121541.md).
203203

204204
#### BitLocker settings added to settings catalog<!-- 10956191 -->
205-
We have added 13 settings from the [Bitlocker configuration service provider (CSP)](/windows/client-management/mdm/bitlocker-csp) have been added to the Microsoft Intune settings catalog. To access the settings, go to **Devices** > **Configuration profiles** and create a settings catalog profile for devices running Windows 10 and later. Then, search **BitLocker** in the settings catalog to view all settings related to BitLocker. For more information about the settings catalog, see [Create a policy using settings catalog](../configuration/settings-catalog.md).
205+
We have added 9 [BitLocker settings that were previously only available in Group Policy (GP)](/windows/security/information-protection/bitlocker/bitlocker-group-policy-settings) to the Microsoft Intune settings catalog. To access the settings, go to **Devices** > **Configuration profiles** and create a settings catalog profile for devices running Windows 10 and later. Then search **BitLocker** in the settings catalog to view all settings related to BitLocker. For more information about the settings catalog, see [Create a policy using settings catalog](../configuration/settings-catalog.md). The added settings include:
206+
207+
- **Provide the unique identifiers for your organization**
208+
- **Enforce drive encryption type on fixed data drives**
209+
- **Allow devices compliant with InstantGo or HSTI to opt out of preboot PIN**
210+
- **Allow enhanced PINs for startup**
211+
- **Disallow standard users from changing the PIN or password**
212+
- **Enable use of BitLocker authentication requiring preboot keyboard input on slates**
213+
- **Enforce drive encryption type on operating system drives**
214+
- **Control use of BitLocker on removeable drives**
215+
- **Enforce drive encryption type on removable data drives**
206216

207217
<!-- vvvvvvvvvvvvvvvvvvvvvv -->
208218
### Monitor and troubleshoot

0 commit comments

Comments
 (0)