You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: memdocs/intune/fundamentals/azure-virtual-desktop-multi-session.md
+2-5Lines changed: 2 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,7 +34,7 @@ ms.collection:
34
34
> [!IMPORTANT]
35
35
> Azure Virtual Desktop multi-session with Microsoft Intune is currently in preview and may be modified before it’s released. See [Public preview in Microsoft Intune](public-preview.md) for more information.
36
36
37
-
You can now use Microsoft Intune to manage Windows 10 or Windows 11 Enterprise multi-session remote desktops in the Microsoft Endpoint Manager admin center just as you can manage a shared Windows 10 or Windows 11 client device. When managing such virtual machines (VMs), you must use device-based configurations. Such configurations require user-less enrollments.
37
+
You can now use Microsoft Intune to manage Windows 10 or Windows 11 Enterprise multi-session remote desktops in the Microsoft Endpoint Manager admin center just as you can manage a shared Windows 10 or Windows 11 client device. When managing such virtual machines (VMs), you must use device-based configurations. Such configurations require user-less enrollments.
38
38
39
39
Windows 10 or Windows 11 Enterprise multi-session is a new Remote Desktop Session Host exclusive to [Azure Virtual Desktop](/azure/virtual-desktop/) on Azure. It provides the following benefits:
40
40
@@ -67,7 +67,7 @@ Windows 10 or Windows 11 Enterprise multi-session VMs are treated as a separate
67
67
68
68
## Create the device configuration profile
69
69
70
-
To configure configuration policies for Windows 10 or Windows 11 Enterprise multi-session VMs, you'll usually use the [Settings catalog](../configuration/settings-catalog.md) in the Microsoft Endpoint Manager admin center.
70
+
To configure configuration policies for Windows 10 or Windows 11 Enterprise multi-session VMs, you'll need to use the [Settings catalog](../configuration/settings-catalog.md) in the Microsoft Endpoint Manager admin center.
71
71
72
72
The existing device configuration profile templates aren't supported for Windows 10 or Windows 11 Enterprise multi-session VMs, with the exception of the following templates:
73
73
@@ -106,9 +106,6 @@ Windows 10 or Windows 11 Administrative Templates are supported for Windows 10 o
106
106
- ADMX-backed policies are supported. Some policies are not yet available in the Settings catalog.
107
107
- ADMX-ingested policies are supported, including Office and Microsoft Edge settings available in Office administrative template files and Microsoft Edge administrative template files. For a complete list of ADMX-ingested policy categories, see [Win32 and Desktop Bridge app policy configuration](/windows/client-management/mdm/win32-and-centennial-app-policy-configuration#overview). Some ADMX ingested settings will not be applicable to Windows 10 or Windows 11 Enterprise multi-session.
108
108
109
-
> [!NOTE]
110
-
> Some ADMX settings currently require an insider build. You can hover over the information bubble next to the setting name to see if an insider build is required for a specific setting.
111
-
112
109
## Compliance and Conditional access
113
110
114
111
You can secure your Windows 10 or Windows 11 Enterprise multi-session VMs by configuring compliance policies and Conditional Access policies in the Microsoft Endpoint Manager admin center. The following compliance policies are supported on Windows 10 or Windows 11 Enterprise multi-session VMs:
Copy file name to clipboardExpand all lines: memdocs/intune/fundamentals/in-development.md
+1-10Lines changed: 1 addition & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ keywords:
8
8
author: dougeby
9
9
ms.author: dougeby
10
10
manager: dougeby
11
-
ms.date: 04/14/2022
11
+
ms.date: 04/19/2022
12
12
ms.topic: conceptual
13
13
ms.service: microsoft-intune
14
14
ms.subservice: fundamentals
@@ -104,15 +104,6 @@ As a public preview, we’re adding new Setup Assistant screens you can configur
104
104
### Device actions available to Android (AOSP) users in Microsoft Intune app<!-- 12645718 -->
105
105
AOSP device users will be able to delete, wipe, and rename their enrolled devices in the Microsoft Intune app. This feature will be available on devices enrolled in Intune as user-associated (Android) AOSP devices.
106
106
107
-
### Updating the device diagnostics folder structure<!-- 8504019 -->
108
-
We’re updating how Intune exports [Windows Device Diagnostic data](../remote-actions/collect-diagnostics.md). Today, the zip file is flat structure of numbered folders that doesn’t identify their contents. Once updated, the logs collected will be named to match the data that was collected, and if multiple files are collected a folder will be created.
109
-
110
-
To take advantage of this diagnostic logging update, devices must install one of the following updates:
111
-
- Windows 11 - KB5011563
112
-
- Windows 10 - KB5011543
113
-
114
-
These updates are expected to be made available through Windows Updates on April 12, 2022.
115
-
116
107
### Support for Audio Alert on Android corporate-owned work- profiles and fully managed (COBO and COPE) devices<!-- 13499471 -->
117
108
You'll be able to use the **Play lost device sound** device action to trigger an alarm sound on the device to assist in locating the lost or stolen Android Enterprise corporate owned work profiles and fully managed devices.
Copy file name to clipboardExpand all lines: memdocs/intune/includes/intune-notices.md
+21-13Lines changed: 21 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,13 +4,33 @@ description: include file
4
4
author: ErikjeMS
5
5
ms.service: microsoft-intune
6
6
ms.topic: include
7
-
ms.date: 01/19/2022
7
+
ms.date: 04/19/2022
8
8
ms.author: erikje
9
9
ms.custom: include file
10
10
---
11
11
12
12
These notices provide important information that can help you prepare for future Intune changes and features.
13
13
14
+
### Plan for Change: iOS/iPadOS notifications will require minimum version 5.2203.0 of the Company Portal<!-- 14131757 -->
15
+
16
+
We will be making service side updates to iOS/iPadOS notifications in Microsoft Intune's May (2205) service release that will require users to have updated to at least version 5.2203.0 of the iOS/iPadOS Company Portal (released in March 2022).
17
+
18
+
#### How does this affect you or your users?
19
+
20
+
There is no change in functionality for push notifications, however, users will need to update to at least version 5.2203.0 of the Company Portal. If users do not update the app prior to this change, they will not receive messages sent by your organization and will instead receive a notification telling them to update their app. Once they update their app, push notifications will resume.
21
+
22
+
Scenarios that send push notifications to the Company Portal include:
-[Delivery of S/MIME certificates for iOS to access Outlook](/exchange/clients-and-mobile-in-exchange-online/outlook-for-ios-and-android/smime-outlook-for-ios-and-android)
The required version of the Company Portal has been released, so most users have likely [updated the app](../user-help/install-a-new-version-of-the-company-portal-app.md) and will not be impacted. However, you may want to notify users of this change to ensure all users continue to receive push notifications sent by your organization.
33
+
14
34
### Plan for change: Intune is moving to support Android 8.0 and later in January 2022<!-- 10946003 -->
15
35
16
36
Microsoft Intune will be moving to support Android version 8.0 (Oreo) and later for mobile device management (MDM) enrolled devices on or shortly after January 7, 2022.
@@ -159,18 +179,6 @@ This change will affect you only if you currently manage, or plan to manage, mac
159
179
160
180
Check your Intune reporting to see what devices or users might be affected. Go to **Devices** > **All devices** and filter by macOS. You can add more columns to help identify who in your organization has devices running macOS 10.14 or earlier. Ask your users to upgrade their devices to a supported OS version before the release of macOS 12.
161
181
162
-
### Plan for change: Intune is ending support for standalone client apps on Microsoft Tunnel<!-- 9370486 -->
163
-
164
-
Beginning on June 14, 2021, the Microsoft Defender for Endpoint app on Android supports Microsoft Tunnel functionality and is the official tunnel client app for Android Enterprise customers. With the release of Microsoft Defender for Endpoint as the Microsoft Tunnel client app, the standalone Microsoft Tunnel app for Android is deprecated. Support will end after January 31, 2022. When support ends, the standalone tunnel app will be removed from the Google Play store.
165
-
166
-
#### How does this affect you or your users?
167
-
168
-
If you use the standalone tunnel app for Android, you'll need to move to the Microsoft Defender for Endpoint app before January 31, 2022. This move will ensure that users can still access the Tunnel Gateway configuration.
169
-
170
-
#### How can you prepare?
171
-
172
-
For your devices that run Android Enterprise and currently use the standalone tunnel app, plan to [replace the standalone tunnel app with the Defender for Endpoint app](../protect/microsoft-tunnel-migrate-app.md). New devices should use Microsoft Defender for Endpoint as the tunnel client app.
173
-
174
182
### Upgrade to the Microsoft Intune Management Extension<!-- 10102913 -->
175
183
176
184
We've released an upgrade to the Microsoft Intune Management Extension to improve handling of Transport Layer Security (TLS) errors on Windows 10 devices.
Copy file name to clipboardExpand all lines: memdocs/intune/protect/checkpoint-sandblast-mobile-mobile-threat-defense-connector.md
+24-24Lines changed: 24 additions & 24 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,14 +1,14 @@
1
1
---
2
2
# required metadata
3
3
4
-
title: Set up Check Point SandBlast MTD connector with Intune
4
+
title: Set up Check Point Harmony Mobile MTD connector with Intune
5
5
titleSuffix: Microsoft Intune
6
-
description: Learn about integrating Intune with Check Point SandBlast Mobile Threat Defense to control mobile device access to your corporate resources.
6
+
description: Learn about integrating Intune with Check Point Harmony Mobile Threat Defense to control mobile device access to your corporate resources.
# Check Point SandBlast Mobile Threat Defense connector with Intune
32
+
# Check Point Harmony Mobile Threat Defense connector with Intune
33
33
34
-
You can control mobile device access to corporate resources using Conditional Access based on risk assessment conducted by Check Point SandBlast Mobile, a mobile threat defense solution that integrates with Microsoft Intune. Risk is assessed based on telemetry collected from devices running the Check Point SandBlast Mobile app.
34
+
You can control mobile device access to corporate resources using Conditional Access based on risk assessment conducted by Check Point Harmony Mobile, a mobile threat defense solution that integrates with Microsoft Intune. Risk is assessed based on telemetry collected from devices running the Harmony Mobile Protect app.
35
35
36
-
You can configure Conditional Access policies based on Check Point SandBlast Mobile risk assessment enabled through Intune device compliance policies, which you can use to allow or block noncompliant devices to access corporate resources based on detected threats.
36
+
You can configure Conditional Access policies based on Check Point Harmony Mobile risk assessment enabled through Intune device compliance policies, which you can use to allow or block noncompliant devices to access corporate resources based on detected threats.
37
37
38
38
> [!NOTE]
39
39
> This Mobile Threat Defense vendor is not supported for unenrolled devices.
@@ -50,14 +50,14 @@ You can configure Conditional Access policies based on Check Point SandBlast Mob
50
50
51
51
- Microsoft Intune subscription
52
52
53
-
- Check Point SandBlast Mobile Threat Defense subscription
54
-
- See [CheckPoint SandBlast website](https://www.checkpoint.com/) for more information.
53
+
- Check Point Harmony Mobile Threat Defense subscription
54
+
- See the [CheckPoint Harmony website](https://www.checkpoint.com/harmony).
55
55
56
-
## How do Intune and Check Point SandBlast Mobile help protect your company resources?
56
+
## How do Intune and Check Point Harmony Mobile help protect your company resources?
57
57
58
-
Check Point Sandblast Mobile app for Android and iOS/iPadOS captures file system, network stack, device and application telemetry where available, then sends the telemetry data to the Check Point SandBlast cloud service to assess the device's risk for mobile threats.
58
+
Check Point Harmony Mobile app for Android and iOS/iPadOS captures file system, network stack, device and application telemetry where available, then sends the telemetry data to the Check Point Harmony cloud service to assess the device's risk for mobile threats.
59
59
60
-
The Intune device compliance policy includes a rule for Check Point SandBlast Mobile Threat Defense, which is based on the Check Point SandBlast risk assessment. When this rule is enabled, Intune evaluates device compliance with the policy that you enabled. If the device is found noncompliant, users are blocked access to corporate resources like Exchange Online and SharePoint Online. Users also receive guidance from the Check Point SandBlast mobile app installed in their devices to resolve the issue and regain access to corporate resources.
60
+
The Intune device compliance policy includes a rule for Check Point Harmony Mobile Threat Defense, which is based on the Check Point Harmony risk assessment. When this rule is enabled, Intune evaluates device compliance with the policy that you enabled. If the device is found noncompliant, users are blocked access to corporate resources like Exchange Online and SharePoint Online. Users also receive guidance from the Harmony Mobile Protect app installed in their devices to resolve the issue and regain access to corporate resources.
61
61
62
62
Here are some common scenarios:
63
63
@@ -74,12 +74,12 @@ When malicious apps such as malware are detected on devices, you can block devic
74
74
*Block when malicious apps are detected:*
75
75
76
76
> [!div class="mx-imgBorder"]
77
-
> 
77
+
> 
78
78
79
79
*Access granted on remediation:*
80
80
81
81
> [!div class="mx-imgBorder"]
82
-
> 
82
+
> 
83
83
84
84
### Control access based on threat to network
85
85
@@ -88,12 +88,12 @@ Detect threats like **Man-in-the-middle** in network, and protect access to Wi-F
88
88
*Block network access through Wi-Fi:*
89
89
90
90
> [!div class="mx-imgBorder"]
91
-
> 
91
+
> 
92
92
93
93
*Access granted on remediation:*
94
94
95
95
> [!div class="mx-imgBorder"]
96
-
> 
96
+
> 
97
97
98
98
### Control access to SharePoint Online based on threat to network
99
99
@@ -102,30 +102,30 @@ Detect threats like **Man-in-the-middle** in network, and prevent synchronizatio
102
102
*Block SharePoint Online when network threats are detected:*
103
103
104
104
> [!div class="mx-imgBorder"]
105
-
> 
105
+
> 
106
106
107
107
*Access granted on remediation:*
108
108
109
109
> [!div class="mx-imgBorder"]
110
-
> 
110
+
> 
111
111
112
112
### Control access on unenrolled devices based on threats from malicious apps
113
113
114
-
When the Check Point Sandblast Mobile Threat Defense solution considers a device to be infected:
114
+
When the Check Point Harmony Mobile Threat Defense solution considers a device to be infected:
115
115
> [!div class="mx-imgBorder"]
116
-
> 
116
+
> 
117
117
118
118
Access is granted on remediation:
119
119
120
120
> [!div class="mx-imgBorder"]
121
-
> 
121
+
> 
122
122
123
123
## Next steps
124
124
125
-
-[Integrate CheckPoint SandBlast with Intune](checkpoint-sandblast-mobile-mtd-connector-integration.md)
125
+
-[Integrate Check Point Harmony Mobile with Intune](checkpoint-sandblast-mobile-mtd-connector-integration.md)
126
126
127
-
-[Set up CheckPoint SandBlast Mobile app](mtd-apps-ios-app-configuration-policy-add-assign.md)
127
+
-[Set up Harmony Mobile Protect app](mtd-apps-ios-app-configuration-policy-add-assign.md)
128
128
129
-
-[Create CheckPoint SandBlast Mobile device compliance policy](mtd-device-compliance-policy-create.md)
129
+
-[Create Check Point Harmony Mobile device compliance policy](mtd-device-compliance-policy-create.md)
130
130
131
-
-[Enable CheckPoint SandBlast Mobile MTD connector](mtd-connector-enable.md)
131
+
-[Enable Check Point Harmony Mobile MTD connector](mtd-connector-enable.md)
0 commit comments