Skip to content

Commit fb8c5a6

Browse files
committed
Merge branch 'main' into release-intune-2204
2 parents ab5af73 + 6dc53bf commit fb8c5a6

34 files changed

Lines changed: 163 additions & 136 deletions

memdocs/intune/fundamentals/azure-virtual-desktop-multi-session.md

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ ms.collection:
3434
> [!IMPORTANT]
3535
> Azure Virtual Desktop multi-session with Microsoft Intune is currently in preview and may be modified before it’s released. See [Public preview in Microsoft Intune](public-preview.md) for more information.
3636
37-
You can now use Microsoft Intune to manage Windows 10 or Windows 11 Enterprise multi-session remote desktops in the Microsoft Endpoint Manager admin center just as you can manage a shared Windows 10 or Windows 11 client device. When managing such virtual machines (VMs), you must use device-based configurations. Such configurations require user-less enrollments.
37+
You can now use Microsoft Intune to manage Windows 10 or Windows 11 Enterprise multi-session remote desktops in the Microsoft Endpoint Manager admin center just as you can manage a shared Windows 10 or Windows 11 client device. When managing such virtual machines (VMs), you must use device-based configurations. Such configurations require user-less enrollments.
3838

3939
Windows 10 or Windows 11 Enterprise multi-session is a new Remote Desktop Session Host exclusive to [Azure Virtual Desktop](/azure/virtual-desktop/) on Azure. It provides the following benefits:
4040

@@ -67,7 +67,7 @@ Windows 10 or Windows 11 Enterprise multi-session VMs are treated as a separate
6767

6868
## Create the device configuration profile
6969

70-
To configure configuration policies for Windows 10 or Windows 11 Enterprise multi-session VMs, you'll usually use the [Settings catalog](../configuration/settings-catalog.md) in the Microsoft Endpoint Manager admin center.
70+
To configure configuration policies for Windows 10 or Windows 11 Enterprise multi-session VMs, you'll need to use the [Settings catalog](../configuration/settings-catalog.md) in the Microsoft Endpoint Manager admin center.
7171

7272
The existing device configuration profile templates aren't supported for Windows 10 or Windows 11 Enterprise multi-session VMs, with the exception of the following templates:
7373

@@ -106,9 +106,6 @@ Windows 10 or Windows 11 Administrative Templates are supported for Windows 10 o
106106
- ADMX-backed policies are supported. Some policies are not yet available in the Settings catalog.
107107
- ADMX-ingested policies are supported, including Office and Microsoft Edge settings available in Office administrative template files and Microsoft Edge administrative template files. For a complete list of ADMX-ingested policy categories, see [Win32 and Desktop Bridge app policy configuration](/windows/client-management/mdm/win32-and-centennial-app-policy-configuration#overview). Some ADMX ingested settings will not be applicable to Windows 10 or Windows 11 Enterprise multi-session.
108108

109-
> [!NOTE]
110-
> Some ADMX settings currently require an insider build. You can hover over the information bubble next to the setting name to see if an insider build is required for a specific setting.
111-
112109
## Compliance and Conditional access
113110

114111
You can secure your Windows 10 or Windows 11 Enterprise multi-session VMs by configuring compliance policies and Conditional Access policies in the Microsoft Endpoint Manager admin center. The following compliance policies are supported on Windows 10 or Windows 11 Enterprise multi-session VMs:

memdocs/intune/fundamentals/in-development.md

Lines changed: 1 addition & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ keywords:
88
author: dougeby
99
ms.author: dougeby
1010
manager: dougeby
11-
ms.date: 04/14/2022
11+
ms.date: 04/19/2022
1212
ms.topic: conceptual
1313
ms.service: microsoft-intune
1414
ms.subservice: fundamentals
@@ -104,15 +104,6 @@ As a public preview, we’re adding new Setup Assistant screens you can configur
104104
### Device actions available to Android (AOSP) users in Microsoft Intune app<!-- 12645718 -->
105105
AOSP device users will be able to delete, wipe, and rename their enrolled devices in the Microsoft Intune app. This feature will be available on devices enrolled in Intune as user-associated (Android) AOSP devices.
106106

107-
### Updating the device diagnostics folder structure<!-- 8504019 -->
108-
We’re updating how Intune exports [Windows Device Diagnostic data](../remote-actions/collect-diagnostics.md). Today, the zip file is flat structure of numbered folders that doesn’t identify their contents. Once updated, the logs collected will be named to match the data that was collected, and if multiple files are collected a folder will be created.
109-
110-
To take advantage of this diagnostic logging update, devices must install one of the following updates:
111-
- Windows 11 - KB5011563
112-
- Windows 10 - KB5011543
113-
114-
These updates are expected to be made available through Windows Updates on April 12, 2022.
115-
116107
### Support for Audio Alert on Android corporate-owned work- profiles and fully managed (COBO and COPE) devices<!-- 13499471 -->
117108
You'll be able to use the **Play lost device sound** device action to trigger an alarm sound on the device to assist in locating the lost or stolen Android Enterprise corporate owned work profiles and fully managed devices.
118109

memdocs/intune/includes/intune-notices.md

Lines changed: 21 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -4,13 +4,33 @@ description: include file
44
author: ErikjeMS
55
ms.service: microsoft-intune
66
ms.topic: include
7-
ms.date: 01/19/2022
7+
ms.date: 04/19/2022
88
ms.author: erikje
99
ms.custom: include file
1010
---
1111

1212
These notices provide important information that can help you prepare for future Intune changes and features.
1313

14+
### Plan for Change: iOS/iPadOS notifications will require minimum version 5.2203.0 of the Company Portal<!-- 14131757 -->
15+
16+
We will be making service side updates to iOS/iPadOS notifications in Microsoft Intune's May (2205) service release that will require users to have updated to at least version 5.2203.0 of the iOS/iPadOS Company Portal (released in March 2022).
17+
18+
#### How does this affect you or your users?
19+
20+
There is no change in functionality for push notifications, however, users will need to update to at least version 5.2203.0 of the Company Portal. If users do not update the app prior to this change, they will not receive messages sent by your organization and will instead receive a notification telling them to update their app. Once they update their app, push notifications will resume.
21+
22+
Scenarios that send push notifications to the Company Portal include:
23+
24+
- [Custom notifications](../remote-actions/custom-notifications.md)
25+
- [Push notifications for noncompliance](../protect/actions-for-noncompliance.md#available-actions-for-noncompliance)
26+
- [Device ownership change push notifications](../apps/company-portal-app.md#device-ownership-notification)
27+
- [Delivery of S/MIME certificates for iOS to access Outlook](/exchange/clients-and-mobile-in-exchange-online/outlook-for-ios-and-android/smime-outlook-for-ios-and-android)
28+
- [Derived credential enrollment](../protect/derived-credentials.md)
29+
30+
#### How can you prepare?
31+
32+
The required version of the Company Portal has been released, so most users have likely [updated the app](../user-help/install-a-new-version-of-the-company-portal-app.md) and will not be impacted. However, you may want to notify users of this change to ensure all users continue to receive push notifications sent by your organization.
33+
1434
### Plan for change: Intune is moving to support Android 8.0 and later in January 2022<!-- 10946003 -->
1535

1636
Microsoft Intune will be moving to support Android version 8.0 (Oreo) and later for mobile device management (MDM) enrolled devices on or shortly after January 7, 2022.
@@ -159,18 +179,6 @@ This change will affect you only if you currently manage, or plan to manage, mac
159179

160180
Check your Intune reporting to see what devices or users might be affected. Go to **Devices** > **All devices** and filter by macOS. You can add more columns to help identify who in your organization has devices running macOS 10.14 or earlier. Ask your users to upgrade their devices to a supported OS version before the release of macOS 12.
161181

162-
### Plan for change: Intune is ending support for standalone client apps on Microsoft Tunnel<!-- 9370486 -->
163-
164-
Beginning on June 14, 2021, the Microsoft Defender for Endpoint app on Android supports Microsoft Tunnel functionality and is the official tunnel client app for Android Enterprise customers. With the release of Microsoft Defender for Endpoint as the Microsoft Tunnel client app, the standalone Microsoft Tunnel app for Android is deprecated. Support will end after January 31, 2022. When support ends, the standalone tunnel app will be removed from the Google Play store.
165-
166-
#### How does this affect you or your users?
167-
168-
If you use the standalone tunnel app for Android, you'll need to move to the Microsoft Defender for Endpoint app before January 31, 2022. This move will ensure that users can still access the Tunnel Gateway configuration.
169-
170-
#### How can you prepare?
171-
172-
For your devices that run Android Enterprise and currently use the standalone tunnel app, plan to [replace the standalone tunnel app with the Defender for Endpoint app](../protect/microsoft-tunnel-migrate-app.md). New devices should use Microsoft Defender for Endpoint as the tunnel client app.
173-
174182
### Upgrade to the Microsoft Intune Management Extension<!-- 10102913 -->
175183

176184
We've released an upgrade to the Microsoft Intune Management Extension to improve handling of Transport Layer Security (TLS) errors on Windows 10 devices.

memdocs/intune/protect/checkpoint-sandblast-mobile-mobile-threat-defense-connector.md

Lines changed: 24 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
---
22
# required metadata
33

4-
title: Set up Check Point SandBlast MTD connector with Intune
4+
title: Set up Check Point Harmony Mobile MTD connector with Intune
55
titleSuffix: Microsoft Intune
6-
description: Learn about integrating Intune with Check Point SandBlast Mobile Threat Defense to control mobile device access to your corporate resources.
6+
description: Learn about integrating Intune with Check Point Harmony Mobile Threat Defense to control mobile device access to your corporate resources.
77
keywords:
88
author: brenduns
99
ms.author: brenduns
1010
manager: dougeby
11-
ms.date: 03/09/2020
11+
ms.date: 04/19/2022
1212
ms.topic: how-to
1313
ms.service: microsoft-intune
1414
ms.subservice: protect
@@ -29,11 +29,11 @@ ms.custom: intune-azure; seodec18
2929
ms.collection: M365-identity-device-management
3030
---
3131

32-
# Check Point SandBlast Mobile Threat Defense connector with Intune
32+
# Check Point Harmony Mobile Threat Defense connector with Intune
3333

34-
You can control mobile device access to corporate resources using Conditional Access based on risk assessment conducted by Check Point SandBlast Mobile, a mobile threat defense solution that integrates with Microsoft Intune. Risk is assessed based on telemetry collected from devices running the Check Point SandBlast Mobile app.
34+
You can control mobile device access to corporate resources using Conditional Access based on risk assessment conducted by Check Point Harmony Mobile, a mobile threat defense solution that integrates with Microsoft Intune. Risk is assessed based on telemetry collected from devices running the Harmony Mobile Protect app.
3535

36-
You can configure Conditional Access policies based on Check Point SandBlast Mobile risk assessment enabled through Intune device compliance policies, which you can use to allow or block noncompliant devices to access corporate resources based on detected threats.
36+
You can configure Conditional Access policies based on Check Point Harmony Mobile risk assessment enabled through Intune device compliance policies, which you can use to allow or block noncompliant devices to access corporate resources based on detected threats.
3737

3838
> [!NOTE]
3939
> This Mobile Threat Defense vendor is not supported for unenrolled devices.
@@ -50,14 +50,14 @@ You can configure Conditional Access policies based on Check Point SandBlast Mob
5050

5151
- Microsoft Intune subscription
5252

53-
- Check Point SandBlast Mobile Threat Defense subscription
54-
- See [CheckPoint SandBlast website](https://www.checkpoint.com/) for more information.
53+
- Check Point Harmony Mobile Threat Defense subscription
54+
- See the [CheckPoint Harmony website](https://www.checkpoint.com/harmony).
5555

56-
## How do Intune and Check Point SandBlast Mobile help protect your company resources?
56+
## How do Intune and Check Point Harmony Mobile help protect your company resources?
5757

58-
Check Point Sandblast Mobile app for Android and iOS/iPadOS captures file system, network stack, device and application telemetry where available, then sends the telemetry data to the Check Point SandBlast cloud service to assess the device's risk for mobile threats.
58+
Check Point Harmony Mobile app for Android and iOS/iPadOS captures file system, network stack, device and application telemetry where available, then sends the telemetry data to the Check Point Harmony cloud service to assess the device's risk for mobile threats.
5959

60-
The Intune device compliance policy includes a rule for Check Point SandBlast Mobile Threat Defense, which is based on the Check Point SandBlast risk assessment. When this rule is enabled, Intune evaluates device compliance with the policy that you enabled. If the device is found noncompliant, users are blocked access to corporate resources like Exchange Online and SharePoint Online. Users also receive guidance from the Check Point SandBlast mobile app installed in their devices to resolve the issue and regain access to corporate resources.
60+
The Intune device compliance policy includes a rule for Check Point Harmony Mobile Threat Defense, which is based on the Check Point Harmony risk assessment. When this rule is enabled, Intune evaluates device compliance with the policy that you enabled. If the device is found noncompliant, users are blocked access to corporate resources like Exchange Online and SharePoint Online. Users also receive guidance from the Harmony Mobile Protect app installed in their devices to resolve the issue and regain access to corporate resources.
6161

6262
Here are some common scenarios:
6363

@@ -74,12 +74,12 @@ When malicious apps such as malware are detected on devices, you can block devic
7474
*Block when malicious apps are detected:*
7575

7676
> [!div class="mx-imgBorder"]
77-
> ![Check Point MTD block when malicious apps are detected](./media/checkpoint-sandblast-mobile-mobile-threat-defense-connector/checkpoint-mtd-2.PNG)
77+
> ![Check Point MTD block when malicious apps are detected](./media/checkpoint-harmony-mobile-mobile-threat-defense-connector/checkpoint-mtd-2.PNG)
7878
7979
*Access granted on remediation:*
8080

8181
> [!div class="mx-imgBorder"]
82-
> ![Check Point MTD access granted](./media/checkpoint-sandblast-mobile-mobile-threat-defense-connector/checkpoint-mtd-3.PNG)
82+
> ![Check Point MTD access granted](./media/checkpoint-harmony-mobile-mobile-threat-defense-connector/checkpoint-mtd-3.PNG)
8383
8484
### Control access based on threat to network
8585

@@ -88,12 +88,12 @@ Detect threats like **Man-in-the-middle** in network, and protect access to Wi-F
8888
*Block network access through Wi-Fi:*
8989

9090
> [!div class="mx-imgBorder"]
91-
> ![Check Point MTD block network access through Wi-Fi](./media/checkpoint-sandblast-mobile-mobile-threat-defense-connector/checkpoint-mtd-4.PNG)
91+
> ![Check Point MTD block network access through Wi-Fi](./media/checkpoint-harmony-mobile-mobile-threat-defense-connector/checkpoint-mtd-4.PNG)
9292
9393
*Access granted on remediation:*
9494

9595
> [!div class="mx-imgBorder"]
96-
> ![Check Point MTD Wi-Fi access granted](./media/checkpoint-sandblast-mobile-mobile-threat-defense-connector/checkpoint-mtd-5.PNG)
96+
> ![Check Point MTD Wi-Fi access granted](./media/checkpoint-harmony-mobile-mobile-threat-defense-connector/checkpoint-mtd-5.PNG)
9797
9898
### Control access to SharePoint Online based on threat to network
9999

@@ -102,30 +102,30 @@ Detect threats like **Man-in-the-middle** in network, and prevent synchronizatio
102102
*Block SharePoint Online when network threats are detected:*
103103

104104
> [!div class="mx-imgBorder"]
105-
> ![Check Point MTD block SharePoint Online access](./media/checkpoint-sandblast-mobile-mobile-threat-defense-connector/checkpoint-mtd-6.PNG)
105+
> ![Check Point MTD block SharePoint Online access](./media/checkpoint-harmony-mobile-mobile-threat-defense-connector/checkpoint-mtd-6.PNG)
106106
107107
*Access granted on remediation:*
108108

109109
> [!div class="mx-imgBorder"]
110-
> ![Check Point MTD SharePoint Online access granted](./media/checkpoint-sandblast-mobile-mobile-threat-defense-connector/checkpoint-mtd-7.PNG)
110+
> ![Check Point MTD SharePoint Online access granted](./media/checkpoint-harmony-mobile-mobile-threat-defense-connector/checkpoint-mtd-7.PNG)
111111
112112
### Control access on unenrolled devices based on threats from malicious apps
113113

114-
When the Check Point Sandblast Mobile Threat Defense solution considers a device to be infected:
114+
When the Check Point Harmony Mobile Threat Defense solution considers a device to be infected:
115115
> [!div class="mx-imgBorder"]
116-
> ![App protection policy blocks due to detected malware](./media/checkpoint-sandblast-mobile-mobile-threat-defense-connector/sandblast-app-policy-block.png)
116+
> ![App protection policy blocks due to detected malware](./media/checkpoint-harmony-mobile-mobile-threat-defense-connector/harmony-app-policy-block.png)
117117
118118
Access is granted on remediation:
119119

120120
> [!div class="mx-imgBorder"]
121-
> ![Access is granted on remediation for App protection policy](./media/checkpoint-sandblast-mobile-mobile-threat-defense-connector/sandblast-app-policy-remediated.png)
121+
> ![Access is granted on remediation for App protection policy](./media/checkpoint-harmony-mobile-mobile-threat-defense-connector/harmony-app-policy-remediated.png)
122122
123123
## Next steps
124124

125-
- [Integrate CheckPoint SandBlast with Intune](checkpoint-sandblast-mobile-mtd-connector-integration.md)
125+
- [Integrate Check Point Harmony Mobile with Intune](checkpoint-sandblast-mobile-mtd-connector-integration.md)
126126

127-
- [Set up CheckPoint SandBlast Mobile app](mtd-apps-ios-app-configuration-policy-add-assign.md)
127+
- [Set up Harmony Mobile Protect app](mtd-apps-ios-app-configuration-policy-add-assign.md)
128128

129-
- [Create CheckPoint SandBlast Mobile device compliance policy](mtd-device-compliance-policy-create.md)
129+
- [Create Check Point Harmony Mobile device compliance policy](mtd-device-compliance-policy-create.md)
130130

131-
- [Enable CheckPoint SandBlast Mobile MTD connector](mtd-connector-enable.md)
131+
- [Enable Check Point Harmony Mobile MTD connector](mtd-connector-enable.md)

0 commit comments

Comments
 (0)