Skip to content

Commit

Permalink
Merge pull request #16769 from MicrosoftDocs/main
Browse files Browse the repository at this point in the history
Publish main to live, Tuesday 3:30PM PST, 11/26
  • Loading branch information
Stacyrch140 authored Nov 26, 2024
2 parents bbcb9d0 + 08df4c4 commit 50501a9
Show file tree
Hide file tree
Showing 2 changed files with 62 additions and 8 deletions.
6 changes: 6 additions & 0 deletions autopilot/troubleshooting-faq.yml
Original file line number Diff line number Diff line change
Expand Up @@ -382,6 +382,12 @@ sections:
- name: Troubleshooting policy conflicts with Windows Autopilot
questions:

- question: |
Why is the web sign-in option missing at the Windows sign-in screen after Windows Autopilot pre-provisioning completes?
answer: |
The [Device password policies](/mem/intune/protect/security-baseline-settings-mdm-all#device-lock) in the Security Baseline causes issues after pre-provisioning. To resolve, change the password settings in Security Baseline to **Not Configured** or assign the baseline to a user group.
- question: |
Can policies conflict with Windows Autopilot working correctly?
answer: |
Expand Down
64 changes: 56 additions & 8 deletions memdocs/intune/fundamentals/in-development.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ keywords:
author: dougeby
ms.author: dougeby
manager: dougeby
ms.date: 11/21/2024
ms.date: 11/26/2024
ms.topic: conceptual
ms.service: microsoft-intune
ms.subservice: fundamentals
Expand Down Expand Up @@ -89,28 +89,76 @@ Applies to:

## Device configuration

### New settings for Windows 24H2 in the Windows settings catalog<!-- 29592329 -->
### More Wi-Fi configurations will be available for personally-owned work profile devices<!-- 28331156 -->

The Settings Catalog lists all the settings you can configure in a device policy, and all in one place. You can view these Windows settings in the Microsoft Intune admin center by going to **Devices** > **Manage devices** > **Configuration** > **Create** > **New policy** > **Windows 10 and later for platform** > **Settings catalog** for profile type.
Intune Wi-Fi configuration profiles for personally-owned work profile devices will soon support configuration of pre-shared keys and proxy settings.

We're working on the addition of new settings for Window 24H2.
You will find these settings in the admin console in **Devices** > **Manage devices** > **Configuration** > **Create** > **New Policy**. Set **Platform** to Android Enterprise and **Profile Type** to Templates and then in the **Personally-Owned Work Profile** section, select Wi-Fi and select the **Create** button.

Applies to:
In the **Configuration settings** tab, when Basic Wi-Fi type is selected, you will see several new options:

- Windows
1. Security type, with options for Open (no authentication), WEP-Pre-shared key, and WPA-Pre-shared key.
2. Proxy settings, with the option to select Automatic and then specify the proxy server URL.

It was possible to configure these in the past with Custom Configuration policies, but going forward, we recommend setting these in the Wi-Fi Configuration profile, because [Intune is ending support for Custom policies in April 2024.](https://aka.ms/Intune/Android-customprofiles).

For more information, see [Wi-Fi settings for personally-owned work profile devices.](../configuration/wi-fi-settings-android-enterprise.md#personally-owned-work-profile).


### Low privileged account for Intune Connector for Active Directory for Hybrid join Autopilot flows<!-- 28662823 -->

We're updating the Intune Connector for Active Directory to use a low privileged account to increase the security of your environment. The old connector will no longer be available for download but will continue to work until deprecation.

For more information, see [Deploy Microsoft Entra hybrid joined devices by using Intune and Windows Autopilot](../../autopilot/windows-autopilot-hybrid.md).

<!-- *********************************************** -->

<!-- ## Device enrollment -->
## Device enrollment

### Update to "Determine based on user choice" enrollment type profile behavior <!-- 29068674 iddraft idready idstaged -->

In Intune today, if an IT admin creates a "Determine based on user choice" enrollment type profile for BYOD enrollments, the user will be prompted to select between **I own this device** and **My company owns this device** to direct them to the appropriate enrollment method. Because fewer than 1% of Apple devices across all Intune tenants are currently enrolled this way, this change won't affect most enrolled devices.

Today, selecting **I own this device** results in the user enrolling via profile-based user enrollment with Company Portal to secure only work related apps. With WWDC 2024, Apple ended support for this enrollment method, subsequently Intune also ended support for the same. Read more about the changes here: [Support has ended for Apple profile-based user enrollment with Company Portal](../fundamentals/whats-new.md#support-has-ended-for-apple-profile-based-user-enrollment-with-company-portal)

We are updating the enrollment behavior for users who select **I own this device**. The new behavior for **I own this device** will result in an [account-driven user enrollment](../enrollment/apple-account-driven-user-enrollment.md), which also supports the use of only secure work related apps.

The behavior when selecting **My company owns this device** is unchanged and will continue to result in device enrollment with the Company Portal that supports securing the entire device.

Admin action:

If you use **Determine based on user choice** enrollment type profile for BYOD scenarios, make sure you have completed the required **PREREQUISITES** to set up account driven user enrollment correctly. See [Set up account driven Apple User Enrollment](../enrollment/apple-account-driven-user-enrollment.md).

If you do not use **Determine based on user choice** enrollment type profile for BYOD scenarios, there are no action items

Applies to:

- iOS/iPadOS

<!-- *********************************************** -->

<!-- ## Device management -->
<!-- ## Device management -->

### Copilot assistant for device query<!-- 26933762 -->

You will soon be able to use Copilot to generate a KQL query to help you get data from across multiple devices in Intune. This capability will be available in the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431) by selecting **Devices** > **Device query** > **Query with Copilot**.

<!-- *********************************************** -->

## Device security

### Security baselines for HoloLens 2 in public preview<!-- 24914095 -->

We’re working to release a public preview of two security baselines for HoloLens 2. These baselines represent Microsoft’s best practice guidelines and experience from deploying and supporting HoloLens 2 devices to customers across various industries. The baselines include:

- **Standard Security Baseline for HoloLens 2**:
The standard security baseline for HoloLens 2 represents the recommendations for configuring security settings that are applicable to all types of customers irrespective of HoloLens 2 use case scenarios.

- **Advanced Security Baseline for HoloLens 2**:
The advanced security baseline for HoloLens 2 represents the recommendations for configuring security settings for the customers who have strict security controls of their environment and require stringent security policies to be applied to any device used in their environment.

To learn more about security baselines with Intune, see [Use security baselines to configure Windows devices in Intune](../protect/security-baselines.md).

### Linux support for Endpoint detection and response exclusion settings<!-- 26549863 -->

We are adding a new Endpoint Security template under Endpoint detection and response (EDR) for the Linux platform, that will be supported through the [Microsoft Defender for Endpoint security settings management](../protect/mde-security-integration.md) scenario.
Expand Down

0 comments on commit 50501a9

Please sign in to comment.