Skip to content

Commit 66c5ad4

Browse files
Learn Build Service GitHub AppLearn Build Service GitHub App
authored andcommitted
Merging changes synced from https://github.com/MicrosoftDocs/memdocs-pr (branch live)
2 parents 19e415a + 6929edc commit 66c5ad4

File tree

4 files changed

+41
-7
lines changed

4 files changed

+41
-7
lines changed

memdocs/intune/developer/app-sdk-android-phase5.md

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -509,6 +509,11 @@ Calling `protectForOID` with empty string for the identity parameter will tag th
509509
This operation will remove encryption from the file/directory if it was previously encrypted.
510510
When a selective wipe command is issued, the file/directory won't be deleted.
511511

512+
> [!WARNING]
513+
> It is important to ensure that only files belonging to a particular identity become protected
514+
> with that identity. Otherwise, other identities may experience data loss when the owning identity
515+
> signs out, as files will be wiped and encryption key access will be lost.
516+
512517
#### Displaying Protected File Content
513518

514519
It is equally critical to have the correct identity set when file content is being *displayed* to prevent unauthorized users from viewing managed data.
@@ -597,6 +602,17 @@ An app can prevent these buffers becoming unreadable by calling `MAMDataProtecti
597602
It is also safe to call `protectForOID` during this notification, if you wish to preserve identity information.
598603
Encryption is guaranteed to be disabled during the notification and calling `protectForOID` in the handler won't encrypt data buffers.
599604

605+
> [!WARNING]
606+
> Encryption operations should be avoided early in the app process. The SDK will perform encryption
607+
> initialization asynchronously as early as possible after app startup. However, if an app makes
608+
> an encryption request in app startup, it may be blocked until encryption initialization is
609+
> complete.
610+
611+
> [!NOTE]
612+
> The Intune App SDK encryption API should be used only to encrypt data as required by Intune
613+
> policy. No protection will be applied to accounts that are not targeted with encryption policy
614+
> enabled, so it cannot be used as general-purpose encryption library.
615+
600616
### Content Providers
601617

602618
A multi-identity app must also protect data shared through `ContentProvider`s to prevent inappropriately sharing managed content.

memdocs/intune/includes/intune-notices.md

Lines changed: 21 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,14 +4,34 @@ description: include file
44
author: dougeby
55
ms.service: microsoft-intune
66
ms.topic: include
7-
ms.date: 03/13/2024
7+
ms.date: 10/30/2024
88
ms.author: dougeby
99
manager: dougeby
1010
ms.custom: include file
1111
---
1212

1313
These notices provide important information that can help you prepare for future Intune changes and features.
1414

15+
### Update to the latest Intune App SDK and Intune App Wrapper for Android 15 support
16+
We've recently released new versions of the Intune App SDK and Intune App Wrapping Tool for Android to support Android 15. We recommend upgrading your app to the latest SDK or wrapper versions to ensure applications stay secure and run smoothly.
17+
18+
#### How does this affect you or your users?
19+
20+
If you have applications using the Intune App SDK or Intune App Wrapping Tool for Android, it's recommended that you update your app to the latest version to support Android 15.
21+
22+
#### How can you prepare?
23+
24+
If you choose to build apps targeting Android API 35, you'll need to adopt the new version of the Intune App SDK for Android (v11.0.0). If you’ve wrapped your app and are targeting API 34 you'll need to use the new version of the App wrapper (v1.0.4549.6).
25+
26+
> [!NOTE]
27+
> As a reminder, while apps must update to the latest SDK if targeting Android 15, apps do not need to update the SDK to simply run on Android 15.
28+
29+
You should also plan to update your documentation or developer guidance if applicable to include this change in support for the SDK.
30+
31+
Here are the public repositories:
32+
- [Intune App SDK for Android](https://github.com/microsoftconnect/ms-intune-app-sdk-android)
33+
- [Intune App Wrapping Tool for Android](https://github.com/microsoftconnect/intune-app-wrapping-tool-android)
34+
1535
### Take Action: Update to the latest Intune App SDK for iOS and Intune App Wrapping Tool for iOS
1636

1737
To support the upcoming release of iOS/iPadOS 18.1, update to the latest versions of the Intune App SDK and the Intune App Wrapping Tool to ensure applications stay secure and run smoothly. **Important:** If you don't update to the latest versions, some app protection policies may not apply to your app in certain scenarios. Review the following GitHub announcements for more details on the specific impact:

windows-365/enterprise/introduction-windows-365-government.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ For more information about Cloud PCs and Windows 365, see [What is Windows 365?]
4545

4646
## Features not yet supported Windows 365 Government
4747

48-
The following features aren't yet supported for Windows 365 GCC or GCC High.
48+
The following features aren't yet supported for Windows 365 GCC or GCC High.
4949

5050
- Unified dashboard
5151
- Windows 365 Security baseline
@@ -68,6 +68,7 @@ The following features aren't yet supported for Windows 365 GCC or GCC High.
6868
- [Support for Omnissa Horizon clients and the Blast protocol](set-up-omnissa-horizon.md)
6969
- [Microsoft Purview Customer Key](purview-customer-key.md)
7070
- [HP Anyware for Windows 365](hp-anyware-set-up.md)
71+
- Bulk Troubleshoot action
7172

7273
## Next steps
7374

windows-365/enterprise/whats-new.md

Lines changed: 2 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -84,12 +84,9 @@ Azure network connections that meet either of the following conditions for more
8484
<!-- ########################## -->
8585
## Week of October 21, 2024
8686

87-
<!-- vvvvvvvvvvvvvvvvvvvvvv -->
88-
### Partners
89-
90-
#### Use Citrix HDX Plus with Windows 365 Frontline<!--54445358-->
87+
#### Windows 365 support for AVC mixed mode when MMR isn't enabled (preview)<!--50205898-->
9188

92-
You can now use Citrix HDX Plus with Windows 365 Frontline Cloud PCs.
89+
AVC Mixed Mode is now available in the default graphics profile. When MMR isn't enabled, AVC/h.264 is used to encode detected image content instead of the RemoteFX image encoder. This improves performance when encoding images relative to bitrate and framerate in network-constrained scenarios.
9390

9491
<!-- ########################## -->
9592
## Week of October 14, 2024

0 commit comments

Comments
 (0)