You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: memdocs/configmgr/core/get-started/2020/includes/2005/6234688.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,7 +36,7 @@ Additionally, you'll need the following items:
36
36
- If a script you run contains functionality from a later version of PowerShell, the client on which you run the script must be running that later version of PowerShell.
37
37
- At least one script that is already created and approved in Configuration Manager.
38
38
- Script parameters aren't for this technical preview.
39
-
- Only scripts that are already created and approved appear in the admin center. For more information on approving scripts, see [Approve or deny a script](/configmgr/apps/deploy-use/create-deploy-scripts.md##run-script-authors-and-approvers).
39
+
- Only scripts that are already created and approved appear in the admin center. For more information on approving scripts, see [Approve or deny a script](../../../../../apps/deploy-use/create-deploy-scripts.md#run-script-authors-and-approvers).
40
40
41
41
42
42
#### Permissions
@@ -46,7 +46,7 @@ The user account needs the following permissions:
46
46
- The **Read** permission for the device's **Collection** in Configuration Manager.
47
47
- The **Admin User** role for the Configuration Manager Microservice application in Azure AD.
48
48
- Add the role in Azure AD from **Enterprise applications** > **Configuration Manager Microservice** > **Users and groups** > **Add user**. Groups are supported if you have Azure AD premium.
49
-
- To use scripts, you must be a member of the appropriate Configuration Manager security role. For more information, see [Security scopes for run scripts](/configmgr/apps/deploy-use/create-deploy-scripts.md#bkmk_ScriptRoles).
49
+
- To use scripts, you must be a member of the appropriate Configuration Manager security role. For more information, see [Security scopes for run scripts](../../../../../apps/deploy-use/create-deploy-scripts.md#bkmk_ScriptRoles).
50
50
- To run scripts, the account must have **Run Script** permissions for **Collections**.
Copy file name to clipboardExpand all lines: memdocs/configmgr/core/plan-design/hierarchy/log-files.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -476,6 +476,7 @@ The following table lists the log files that contain information related to appl
476
476
|SMSdpmon.log|Records details about the distribution point health monitoring scheduled task that is configured on a distribution point.|Site server|
477
477
|SoftwareCatalogUpdateEndpoint.log|Records activities for managing the URL for the Application Catalog shown in Software Center.|Client|
478
478
|SoftwareCenterSystemTasks.log|Records activities related to Software Center prerequisite component validation.|Client|
479
+
|TSDTHandler.log|For the task sequence deployment type. It logs the process from app enforcement (install or uninstall) to the launch of the task sequence. Use it with AppEnforce.log and smsts.log.|Client|<!-- MEMDocs#336 -->
Copy file name to clipboardExpand all lines: memdocs/configmgr/protect/deploy-use/bitlocker/deploy-management-agent.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -121,7 +121,7 @@ When you create more than one policy, you can configure their relative priority.
121
121
122
122
1. If you want the device to potentially encrypt or decrypt its drives at any time, select the option to **Allow remediation outside the maintenance window**. If the collection has any maintenance windows, it still remediates this BitLocker policy.
123
123
124
-
1. Configure a **Simple** or **Custom** schedule. By default, the client evaluates its compliance with this policy every 12 hours.
124
+
1. Configure a **Simple** or **Custom** schedule. The client evaluates its compliance based on the settings specified in the schedule.
Copy file name to clipboardExpand all lines: memdocs/intune/fundamentals/in-development.md
+1-8Lines changed: 1 addition & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -84,14 +84,7 @@ To configure the Company Portal to be in ASAM in the Microsoft Endpoint Manager,
84
84
## Device configuration
85
85
86
86
### Set device compliance state from third-party MDM partners<!-- 6361689 -->
87
-
You’ll soon be able to allow the compliance state of iOS or Android devices managed by third-party Mobile Device Management (MDM) partners to be set in Azure Active Directory (Azure AD).
88
-
89
-
When Intune is configured for partner compliance, compliance data for devices managed by the third-party MDM partner is sent to Intune for compliance evaluation. The results are then passed to Azure AD where the compliance data is used to enforce your conditional access policies for those devices.
90
-
91
-
Support will soon include the following partners:
92
-
- VMware WorkspaceONE (previously known as AirWatch)
93
-
94
-
To enable a device compliance partner you’ll use a new node in the Microsoft Endpoint Manager admin center: **Tenant Administration** > **Connectors and Tokens** > **Partner Compliance management** where you’ll select **Add Compliance Partner**.
87
+
Microsoft 365 customers who own third-party MDM solutions will be able to enforce Conditional Access policies for Microsoft 365 apps on iOS and Android via integration with Microsoft Intune Device Compliance service. Third-party MDM vendor will leverage the Intune Device Compliance service to send device compliance data to Intune. Intune will then evaluate to determine if the device is trusted and set the conditional access attributes in Azure AD. Customers will be required to set Azure AD Conditional Access policies from within the Microsoft Endpoint Manager admin center or the Azure AD portal.
95
88
96
89
### Add a link to your company portal support website to emails for noncompliance<!-- 7225498 -->
97
90
We're adding a new setting to the email notification template that will add the link to your company portal website to email notifications that are sent to users of non-compliant devices. (**Endpoint security** > **Device compliance** > **Notifications** > **Create notification**). Users who receive an email due to having a noncompliant device can use the link to open a website to learn more about why their device isn’t compliant.
### Decreasing support for Android device administrator<!--5857738-->
32
-
Android device administrator (sometimes referred to "legacy" Android management and released with Android 2.2) is a way to manage Android devices. However, improved management functionality is now available with [Android Enterprise](../enrollment/connect-intune-android-enterprise.md)(released with Android 5.0). In an effort to move to modern, richer, and more secure device management, Google is decreasing device administrator support in new Android releases.
31
+
### Decreasing support for Android device administrator<!--7371518-->
32
+
Android device administrator management was released in Android 2.2 as a way to manage Android devices. Then beginning with Android 5, the more modern management framework of [Android Enterprise](../enrollment/connect-intune-android-enterprise.md)was released (for devices that can reliably connect to Google Mobile Services). Google is encouraging movement off of device administrator management by decreasing its management support in new Android releases.
33
33
34
34
#### How does this affect me?
35
-
Because of these changes by Google, Intune users will be impacted in the following ways:
36
-
- Intune will only be able to provide full support for device administrator-managed Android devices running Android 10 and later through Q2 CY2020. Device administrator-managed devices that are running Android 10 or later after this time won't be able to be entirely managed. In particular, impacted devices won't receive new password requirements.
37
-
- Samsung Knox devices won't be impacted in this timeframe because extended support is provided through Intune's integration with the Knox platform. This gives you more time to plan the transition off device admin management.
38
-
- Device administrator-managed Android devices that remain on Android versions below Android 10 won't be impacted and can continue to be entirely managed with device administrator.
39
-
- For all devices running Android 10 and later, Google has restricted the ability for device administrator management agents like Company Portal to access device identifier information. This restriction impacts the following Intune features after a device is updated to Android 10 or later:
40
-
- Network access control for VPN will no longer work.
41
-
- Identifying devices as corporate-owned with an IMEI or serial number won't automatically mark devices as corporate-owned.
42
-
- The IMEI and serial number will no longer be visible to IT admins in Intune.
43
-
> [!NOTE]
44
-
> This only impacts device administrator-managed devices on Android 10 and later and does not affect devices being managed as Android Enterprise.
35
+
Because of these changes by Google, in the fourth quarter of 2020, you will no longer have as extensive management capabilities on impacted device administrator-managed devices.
36
+
37
+
> [!NOTE]
38
+
> This date was previously communicated as third quarter of 2020, but it has been moved out based on the [latest information from Google](https://www.blog.google/products/android-enterprise/da-migration/).
39
+
40
+
##### Device types that will be impacted
41
+
Devices that will be impacted by the decreasing device administrator support are those for which all three conditions below apply:
42
+
- Enrolled in device administrator management.
43
+
- Running Android 10 or later.
44
+
- Not a Samsung device.
45
+
46
+
Devices will not be impacted if they are any of the below:
47
+
- Not enrolled with device administrator management.
48
+
- Running an Android version below Android 10.
49
+
- Samsung devices. Samsung Knox devices won't be impacted in this timeframe because extended support is provided through Intune’s integration with the Knox platform. This gives you additional time to plan the transition off device administrator management for Samsung devices.
50
+
51
+
##### Settings that will be impacted
52
+
[Google's decreased device administrator support](https://developers.google.com/android/work/device-admin-deprecation) prevents configuration of these settings from applying on impacted devices.
- Set **Number of sign-in failures before wiping device** (will not apply on devices without a password set, but will apply on devices with a password)
59
+
- Set **Password expiration (days)**
60
+
- Set **Required password type**
61
+
- Set **Prevent use of previous passwords**
62
+
- Block **Smart Lock and other trust agents**
63
+
64
+
###### Compliance policy settings
65
+
66
+
- Set **Required password type**
67
+
- Set **Minimum password length**
68
+
- Set **Number of days until password expires**
69
+
- Set **Number of previous passwords to prevent reuse**
70
+
71
+
###### Additional impacts based on Android OS version
72
+
73
+
**Android 10**: For all device administrator-managed devices (including Samsung) running Android 10 and later, Google has restricted the ability for device administrator management agents like Company Portal to access device identifier information. This restriction impacts the following Intune features after a device is updated to Android 10 or later:
74
+
- Network access control for VPN will no longer work
75
+
- Identifying devices as corporate-owned with an IMEI or serial number won't automatically mark devices as corporate-owned
76
+
- The IMEI and serial number will no longer be visible to IT admins in Intune
77
+
78
+
**Android 11**: We are currently testing Android 11 support on the latest developer beta release to evaluate if it will cause impact on device administrator-managed devices.
79
+
80
+
#### User experience of impacted settings on impacted devices
81
+
82
+
Impacted configuration settings:
83
+
- For already enrolled devices that already had the settings applied, the impacted configuration settings will continue being enforced.
84
+
- For newly enrolled devices, newly assigned settings, and updated settings, the impacted configuration settings will not be enforced (but all other configuration settings will still be enforced).
85
+
86
+
Impacted compliance settings:
87
+
- For already enrolled devices that already had the settings applied, the impacted compliance settings will still show as reasons for noncompliance on the “Update device settings” page, the device will be out of compliance, and the password requirements will still be enforced in the Settings app.
88
+
- For newly enrolled devices, newly assigned settings, and updated settings, the impacted compliance settings will still show as reasons for noncompliance on the “Update device settings” page and the device will be out of compliance, but stricter password requirements will not be enforced in the Settings app.
89
+
90
+
#### Cause of impact
91
+
Devices will begin being impacted in the fourth quarter of 2020. At that time, there will be a Company Portal app update that will increase the Company Portal API targeting from level 28 to level 29 ([as required by Google](https://www.blog.google/products/android-enterprise/da-migration/)).
92
+
93
+
At that point, device administrator-managed devices that are not manufactured by Samsung will be impacted once the user completes both these actions:
94
+
- Updates to Android 10 or later.
95
+
- Updates the Company Portal app to the version that targets API level 29.
45
96
46
97
#### What do I need to do to prepare for this change?
47
-
To avoid the reduction in functionality coming in Q3 CY2020, we recommend the following:
48
-
-Don't onboard new devices into device administrator management.
49
-
- If a device is expected to receive an update to Android 10, migrate it off of device administrator management to Android Enterprise management and/or app protection policies.
98
+
To avoid the reduction in functionality coming in the fourth quarter of 2020, we recommend the following:
99
+
-**New enrollments**: Onboard new devices into [Android Enterprise](../enrollment/connect-intune-android-enterprise.md) management (where available) and/or [app protection policies](../apps/app-protection-policies.md). Avoid onboarding new devices into device administrator management.
100
+
-**Previously enrolled devices**: If a device administrator-managed device is running Android 10 or later or may update to Android 10 or later (especially if it is not a Samsung device), move it off of device administrator management to [Android Enterprise](../enrollment/connect-intune-android-enterprise.md) management and/or [app protection policies](../apps/app-protection-policies.md). You can leverage the streamlined flow to [move Android devices from device administrator to work profile management](../enrollment/android-move-device-admin-work-profile.md).
50
101
51
102
#### Additional information
103
+
-[Move Android devices from device administrator to work profile management](../enrollment/android-move-device-admin-work-profile.md)
104
+
-[Set up enrollment of Android Enterprise work profile devices](../enrollment/android-work-profile-enroll.md)
105
+
-[Set up enrollment of Android Enterprise dedicated devices](../enrollment/android-kiosk-enroll.md)
106
+
-[Set up enrollment of Android Enterprise fully managed devices](../enrollment/android-fully-managed-enroll.md)
107
+
-[How to create an assign app protection policies](../apps/app-protection-policies.md)
108
+
-[How to use Intune in environments without Google Mobile Services](../apps/manage-without-gms.md)
109
+
-[Understanding app protection policies and work profiles on Android Enterprise devices](../apps/android-deployment-scenarios-app-protection-work-profiles.md)
110
+
-[Google’s blog about what you need to know about Device Admin deprecation](https://www.blog.google/products/android-enterprise/da-migration/)
52
111
-[Google's guidance for migration from device administrator to Android Enterprise](http://static.googleusercontent.com/media/android.com/en/enterprise/static/2016/pdfs/enterprise/Android-Enterprise-Migration-Bluebook_2019.pdf)
53
-
-[Google's documentation on the plan to deprecate the device administrator API](https://developers.google.com/android/work/device-admin-deprecation)
112
+
-[Google's documentation of deprecated device administrator APIs](https://developers.google.com/android/work/device-admin-deprecation)
0 commit comments