Skip to content

Commit f4f557c

Browse files
authored
Merge pull request #16396 from MicrosoftDocs/main
Release Intune 2410
2 parents 189eec8 + f14fd3c commit f4f557c

13 files changed

+137
-91
lines changed

memdocs/intune/apps/app-configuration-policies-use-android.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ keywords:
88
author: Erikre
99
ms.author: erikre
1010
manager: dougeby
11-
ms.date: 08/08/2024
11+
ms.date: 10/09/2024
1212
ms.topic: how-to
1313
ms.service: microsoft-intune
1414
ms.subservice: apps
@@ -76,6 +76,7 @@ Android Enterprise has several enrollment methods. The enrollment type depends o
7676
> * Camera
7777
> * Record audio
7878
> * Allow body sensor data
79+
> * Background location
7980
8081
11. If the managed app supports configuration settings, the **Configuration settings format** dropdown box is visible. Select one of the following methods to add configuration information:
8182
- **Use configuration designer**

memdocs/intune/apps/apps-supported-intune-apps.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,7 @@ The below apps support the Core Intune App Protection Policy settings and are al
9090
|Microsoft PowerPoint|[Android](https://play.google.com/store/apps/details?id=com.microsoft.office.powerpoint)||No settings||N/A|||||
9191
|Microsoft PowerPoint|[iOS](https://apps.apple.com/us/app/microsoft-powerpoint/id586449534)||No settings||N/A|||||
9292
|Microsoft Remote Desktop|[Android](https://play.google.com/store/apps/details?id=com.microsoft.rdc.androidx)||||N/A|N/A|N/A|N/A||
93-
|Microsoft Remote Desktop|[iOS](https://apps.apple.com/us/app/remote-desktop-mobile/id714464092)||||N/A|N/A|N/A|N/A||
93+
|Microsoft Windows App|[iOS](https://apps.apple.com/us/app/remote-desktop-mobile/id714464092)|| see [Configure device redirection](/azure/virtual-desktop/client-device-redirection-intune).||N/A|N/A|N/A|N/A||
9494
|Microsoft SharePoint|[Android](https://play.google.com/store/apps/details?id=com.microsoft.sharepoint)||No settings||N/A|||N/A||
9595
|Microsoft SharePoint|[iOS](https://apps.apple.com/us/app/microsoft-sharepoint/id1091505266)||No settings||N/A|||N/A||
9696
|Microsoft Teams|[Android](https://play.google.com/store/apps/details?id=com.microsoft.teams)||No settings||N/A||||✔ Supported for v1416/1.0.0.2023226005 (2023226050) or later|

memdocs/intune/configuration/device-restrictions-ios.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -801,6 +801,9 @@ You can also:
801801
- When set to **Yes**, be sure the device has a Wi-Fi profile. If you don't assign a Wi-Fi profile, then this setting can prevent devices from connecting to the internet. For example, if this device restrictions profile is assigned before a Wi-Fi profile, then the device might be blocked from connecting to the internet.
802802

803803
- If the device can't connect, then unenroll the device, and re-enroll with a Wi-Fi profile. Then, set this setting to **Yes** in a device restrictions profile, and assign the profile to the device.
804+
805+
> [!NOTE]
806+
> **Require devices to use Wi-Fi networks set up via configuration profiles** does not support Wi-Fi profiles deployed using [custom profiles](custom-settings-ios.md).
804807
805808
This feature applies to:
806809
- iOS/iPadOS 14.5 and newer

memdocs/intune/fundamentals/supported-devices-browsers.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: Smritib17
88
ms.author: smbhardwaj
99
manager: dougeby
10-
ms.date: 09/09/2024
10+
ms.date: 10/10/2024
1111
ms.topic: conceptual
1212
ms.service: microsoft-intune
1313
ms.subservice: fundamentals

memdocs/intune/fundamentals/whats-new.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,7 @@ For more information, see:
105105

106106
- [What's new for the certificate connector](../protect/certificate-connector-overview.md#september-19-2024)
107107

108-
- [Apply PFX changes to certificate](../protect/certificates-pfx-configure.md#update-certificate-connector-for-kb5014754-requirements)
108+
- [Apply PFX changes to certificate](../protect/certificates-pfx-configure.md)
109109

110110
## Week of September 23, 2024 (Service release 2409)
111111

memdocs/intune/includes/android-supported-os.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,11 +4,11 @@ ms.author: erikje
44
ms.service: microsoft-intune
55
ms.subservice: fundamentals
66
ms.topic: include
7-
ms.date: 02/01/2022
7+
ms.date: 10/10/2024
88
ms.localizationpriority: high
99
---
1010

1111
> [!NOTE]
12-
> Intune requires Android 8.x or higher for device enrollment scenarios and app configuration delivered through Managed devices app configuration policies. This requirement does not apply to [Microsoft Teams Android devices](https://www.microsoft.com/microsoft-teams/across-devices/devices?rtc=2) as these devices will continue to be supported.
12+
> This requirement does not apply to [Microsoft Teams Android devices](https://www.microsoft.com/microsoft-teams/across-devices/devices?rtc=2) as these devices will continue to be supported.
1313
>
1414
> For Intune app protection policies and app configuration delivered through Managed apps app configuration policies, Intune requires Android 9.0 or higher.

memdocs/intune/includes/mdm-supported-devices.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ ms.author: erikje
44
ms.service: microsoft-intune
55
ms.subservice: fundamentals
66
ms.topic: include
7-
ms.date: 09/06/2024
7+
ms.date: 10/10/2024
88
ms.localizationpriority: high
99
---
1010

@@ -30,8 +30,9 @@ ms.localizationpriority: high
3030
3131
### Android
3232

33-
- Android 8.0 and later (including Samsung KNOX Standard 3.0 and higher: [requirements](https://www.samsungknox.com/en/knox-platform/supported-devices/2.4+))
34-
- Android enterprise: [requirements](https://support.google.com/work/android/topic/9428066)
33+
- For user-based management methods: Android 10.0 and later
34+
- For userless management methods: Android 8.0 and later (including Samsung KNOX Standard 3.0 and higher: [requirements](https://www.samsungknox.com/en/knox-platform/supported-devices/2.4+))
35+
- Android enterprise
3536
- Android open source project device: [See here for the list of supported devices](../fundamentals/android-os-project-supported-devices.md)
3637
[!INCLUDE [android-supported-os](android-supported-os.md)]
3738

memdocs/intune/protect/certificate-authority-add-scep-overview.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ keywords:
55
author: lenewsad
66
ms.author: lanewsad
77
manager: dougeby
8-
ms.date: 07/24/2024
8+
ms.date: 10/15/2024
99
ms.topic: how-to
1010
ms.service: microsoft-intune
1111
ms.subservice: protect
@@ -27,9 +27,7 @@ ms.collection:
2727
- sub-certificates
2828
---
2929

30-
# Add partner certification authority in Intune using SCEP
31-
32-
[!INCLUDE [azure_portal](../includes/strong-mapping-cert.md)]
30+
# Add partner certification authority in Intune using SCEP
3331

3432
Use third-party certification authorities (CA) with Intune. Third-party CAs can provision mobile devices with new or renewed certificates by using the Simple Certificate Enrollment Protocol (SCEP), and can support Windows, iOS/iPadOS, Android, and macOS devices.
3533

memdocs/intune/protect/certificates-pfx-configure.md

Lines changed: 61 additions & 53 deletions
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,13 @@ ms.collection:
3232
---
3333
# Configure and use PKCS certificates with Intune
3434

35+
**Applies to**L
36+
- Android
37+
- iOS/iPadOS
38+
- macOS
39+
- Windows 10/11
40+
41+
3542
Microsoft Intune supports the use of private and public key pair (PKCS) certificates. This article reviews the requirements for PKCS certificates with Intune, including the export of a PKCS certificate then adding it to an Intune device configuration profile.
3643

3744
Microsoft Intune includes built-in settings to use PKCS certificates for access and authentication to your organizations resources. Certificates authenticate and secure access to your corporate resources like a VPN or a WiFi network. You deploy these settings to devices using device configuration profiles in Intune.
@@ -66,6 +73,60 @@ To use PKCS certificates with Intune, you need the following infrastructure:
6673
- [Prerequisites](certificate-connector-prerequisites.md)
6774
- [Installation and configuration](certificate-connector-install.md)
6875

76+
## Update certificate connector: Strong mapping requirements for KB5014754
77+
78+
The Key Distribution Center (KDC) requires a strong mapping format in PKCS certificates deployed by Microsoft Intune and used for certificate-based authentication. The mapping must have a security identifier (SID) extension that maps to the user or device SID. If a certificate doesn't meet the new strong mapping criteria set by the full enforcement mode date, authentication will be denied. For more information about the requirements, see [KB5014754: Certificate-based authentication changes on Windows domain controllers ](https://support.microsoft.com/topic/kb5014754-certificate-based-authentication-changes-on-windows-domain-controllers-ad2c23b0-15d8-4340-a468-4d4f3b188f16).
79+
80+
In the Microsoft Intune Certificate Connector, version 6.2406.0.1001, we released an update that adds the object identifier attribute containing the user or device SID to the certificate, effectively satisfying the strong mapping requirements. This update applies to users and devices synced from an on-premises Active Directory to Microsoft Entra ID, and is available across all platforms, with some differences:
81+
82+
* Strong mapping changes apply to *user certificates* for all OS platforms.
83+
84+
* Strong mapping changes apply to *device certificates* for Microsoft Entra hybrid-joined Windows devices.
85+
86+
To ensure that certficate-based authentication continues working, you must take the following actions:
87+
88+
- Update the Microsoft Intune Certificate Connector to version 6.2406.0.1001. For information about the latest version and how to update the certificate connector, see [Certificate connector for Microsoft Intune](certificate-connector-overview.md).
89+
90+
- Make changes to registry key information on the Windows server that hosts the certificate connector.
91+
92+
Complete the following procedure to modify the registry keys and apply the strong mapping changes to certificates. These changes apply to new PKCS certificates and PKCS certificates that are being renewed.
93+
94+
>[!TIP]
95+
> This procedure requires you to modify the registry in Windows. For more information, see the following resources on Microsoft Support:
96+
> - [How to back up and restore the registry in Windows - Microsoft Support](https://support.microsoft.com/topic/how-to-back-up-and-restore-the-registry-in-windows-855140ad-e318-2a13-2829-d428a2ab0692)
97+
> - [How to add, modify, or delete registry subkeys and values by using a .reg file - Microsoft Support](https://support.microsoft.com/topic/how-to-add-modify-or-delete-registry-subkeys-and-values-by-using-a-reg-file-9c7f37cf-a5e9-e1cd-c4fa-2a26218a1a23)
98+
99+
1. In the Windows registry, change the value for `[HKLM\Software\Microsoft\MicrosoftIntune\PFXCertificateConnector](DWORD)EnableSidSecurityExtension` to **1**.
100+
101+
1. Restart the certificate connector service.
102+
1. Go to **Start** > **Run**.
103+
2. Open **services.msc**.
104+
3. Restart these services:
105+
- **PFX Create Legacy Connector for Microsoft Intune**
106+
107+
- **PFX Create Certificate Connector for Microsoft Intune**
108+
109+
1. Changes begin applying to all new certificates, and to certificates being renewed. To verify that authentication works, we recommend testing all places where certificate-based authentication could be used, including:
110+
- Apps
111+
- Intune-integrated certification authorities
112+
- NAC solutions
113+
- Networking infrastructure
114+
115+
To roll back changes:
116+
117+
1. Restore the original registry settings.
118+
119+
1. Restart these services:
120+
121+
- **PFX Create Legacy Connector for Microsoft Intune**
122+
123+
- **PFX Create Certificate Connector for Microsoft Intune**
124+
125+
1. Create a new PKCS certificate profile for affected devices, to reissue certificates without the SID attribute.
126+
127+
> [!TIP]
128+
> If you use a Digicert CA, you must create a certificate template for users with an SID and another template for users without an SID. For more information, see the [DigiCert PKI Platform 8.24.1 release notes](https://knowledge.digicert.com/general-information/release-notes-pki).
129+
69130
## Export the root certificate from the Enterprise CA
70131

71132
To authenticate a device with VPN, WiFi, or other resources, a device needs a root or intermediate CA certificate. The following steps explain how to get the required certificate from your Enterprise CA.
@@ -357,59 +418,6 @@ Platforms:
357418
> - Device properties used in the *subject* or *SAN* of a device certificate, like **IMEI**, **SerialNumber**, and **FullyQualifiedDomainName**, are properties that could be spoofed by a person with access to the device.
358419
> - A device must support all variables specified in a certificate profile for that profile to install on that device. For example, if **{{IMEI}}** is used in the subject name of a SCEP profile and is assigned to a device that doesn't have an IMEI number, the profile fails to install.
359420
360-
## Update certificate connector for KB5014754 requirements
361-
362-
The Windows Kerberos Key Distribution Center (KDC) requires a strong mapping format for certificates issued by Active Directory Certificate Services. This requirement is applicable to PKCS certificates deployed by Microsoft Intune and used for certificate-based authentication. The mapping must have a security identifier (SID) extension that maps to the user or device SID. If a certificate doesn't meet the new strong mapping criteria set by the full enforcement mode date, authentication will be denied. For more information about the requirements, see [KB5014754: Certificate-based authentication changes on Windows domain controllers ](https://support.microsoft.com/topic/kb5014754-certificate-based-authentication-changes-on-windows-domain-controllers-ad2c23b0-15d8-4340-a468-4d4f3b188f16).
363-
364-
In the Microsoft Intune Certificate Connector, version 6.2406.0.1001, we released an update that adds the object identifier attribute containing the user or device SID to the certificate, effectively satisfying the strong mapping requirements. This update applies to users and devices synced from an on-premises Active Directory to Microsoft Entra ID, and is available across all platforms, with some differences:
365-
366-
* Strong mapping changes apply to *user certificates* for all OS platforms.
367-
368-
* Strong mapping changes apply to *device certificates* for Microsoft Entra hybrid-joined Windows devices.
369-
370-
To ensure that certficate-based authentication continues working, you must take the following actions:
371-
372-
- Update the Microsoft Intune Certificate Connector to version 6.2406.0.1001. For information about the latest version and how to update the certificate connector, see [Certificate connector for Microsoft Intune](certificate-connector-overview.md).
373-
- Make changes to registry key information on the Windows server that hosts the certificate connector.
374-
375-
Complete the following procedure to modify the registry keys and apply the strong mapping changes to certificates. These changes apply to new PKCS certificates and PKCS certificates that are being renewed.
376-
377-
>[!TIP]
378-
> This procedure requires you to modify the registry in Windows. For more information, see the following resources on Microsoft Support:
379-
> - [How to back up and restore the registry in Windows - Microsoft Support](https://support.microsoft.com/topic/how-to-back-up-and-restore-the-registry-in-windows-855140ad-e318-2a13-2829-d428a2ab0692)
380-
> - [How to add, modify, or delete registry subkeys and values by using a .reg file - Microsoft Support](https://support.microsoft.com/topic/how-to-add-modify-or-delete-registry-subkeys-and-values-by-using-a-reg-file-9c7f37cf-a5e9-e1cd-c4fa-2a26218a1a23)
381-
382-
1. In the Windows registry, change the value for `[HKLM\Software\Microsoft\MicrosoftIntune\PFXCertificateConnector](DWORD)EnableSidSecurityExtension` to **1**.
383-
384-
1. Restart the certificate connector service.
385-
1. Go to **Start** > **Run**.
386-
2. Open **services.msc**.
387-
3. Restart these services:
388-
- **PFX Create Legacy Connector for Microsoft Intune**
389-
390-
- **PFX Create Certificate Connector for Microsoft Intune**
391-
392-
1. Changes begin applying to all new certificates, and to certificates being renewed. To verify that authentication works, we recommend testing all places where certificate-based authentication could be used, including:
393-
- Apps
394-
- Intune-integrated certification authorities
395-
- NAC solutions
396-
- Networking infrastructure
397-
398-
To roll back changes:
399-
400-
1. Restore the original registry settings.
401-
402-
1. Restart these services:
403-
404-
- **PFX Create Legacy Connector for Microsoft Intune**
405-
406-
- **PFX Create Certificate Connector for Microsoft Intune**
407-
408-
1. Create a new PKCS certificate profile for affected devices, to reissue certificates without the SID attribute.
409-
410-
> [!TIP]
411-
> If you use a Digicert CA, you must create a certificate template for users with an SID and another template for users without an SID. For more information, see the [DigiCert PKI Platform 8.24.1 release notes](https://knowledge.digicert.com/general-information/release-notes-pki).
412-
413421
## Next steps
414422

415423
- [Use SCEP for certificates](certificates-scep-configure.md)

0 commit comments

Comments
 (0)