Skip to content

Commit

Permalink
Merge pull request #17047 from MicrosoftDocs/main
Browse files Browse the repository at this point in the history
Publish main to live, 01/09/25, 3:30 PM PT
  • Loading branch information
Ruchika-mittal01 authored Jan 9, 2025
2 parents 2811a25 + 2d37f5d commit 42d43df
Show file tree
Hide file tree
Showing 9 changed files with 432 additions and 400 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ keywords:
author: Erikre
ms.author: erikre
manager: dougeby
ms.date: 09/23/2024
ms.date: 01/09/2025
ms.topic: conceptual
ms.service: microsoft-intune
ms.subservice: apps
Expand Down Expand Up @@ -101,6 +101,8 @@ There are some exempt apps and platform services that Intune app protection poli
|com.azure.authenticator |Azure Authenticator app, which is required for successful authentication in many scenarios. |
|com.microsoft.windowsintune.companyportal |Intune Company Portal|
|com.android.providers.contacts |Native contacts app |
|com.samsung.android.providers.contacts | Samsung contacts provider. Allowed for Samsung devices. |
|com.android.providers.blockednumber | Android Block number provider. Allowed for Android devices. |

### Conditional exemptions
These apps and services are only allowed for data transfer to and from Intune-managed apps under certain conditions.
Expand All @@ -115,6 +117,8 @@ There are some exempt apps and platform services that Intune app protection poli
|com.android.documentsui|Android Document Picker|Allowed when opening or creating a file.|
|com.google.android.documentsui |Android Document Picker (Android 10+)|Allowed when opening or creating a file.|



For more information, see [Data transfer policy exceptions for apps](app-protection-policies-exception.md).

## Access requirements
Expand Down
16 changes: 9 additions & 7 deletions memdocs/intune/apps/apps-deploy.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ keywords:
author: Erikre
ms.author: erikre
manager: dougeby
ms.date: 06/27/2024
ms.date: 01/09/2025
ms.topic: how-to
ms.service: microsoft-intune
ms.subservice: apps
Expand Down Expand Up @@ -39,7 +39,7 @@ ms.collection:
After you've [added an app](apps-add.md) to Microsoft Intune, you can assign the app to users and devices. It's important to note that you can deploy an app to a device whether or not the device is managed by Intune.

> [!NOTE]
> The **Available for enrolled devices** deployment intent is supported for **user groups** and **device groups** when targeting Android Enterprise fully managed devices (COBO) and Android Enterprise corporate-owned personally-enabled (COPE) devices.
> The **Available for enrolled devices** deployment intent is supported for **user groups** and **device groups** when targeting Android Enterprise fully managed devices (COBO) and Android Enterprise corporate-owned personally enabled (COPE) devices.
## Options when assigning managed apps

Expand All @@ -64,7 +64,7 @@ The following table lists the various options when *assigning* apps to users and
>
> For almost all app types and platforms, *Available assignments* are only valid when assigning to user groups, not device groups. Win32 apps can be assigned to either user or device groups.
>
> If managed Google Play pre-production track apps are assigned as required on Android Enterprise personally-owned work profile devices, they will not install on the device. To work around this, create two identical user groups and assign the pre-production track as "available" to one and "required" to the other. The result will be that the pre-production track successfully deploys to the device.
> If managed Google Play preproduction track apps are assigned as required on Android Enterprise personally owned work profile devices, they won't install on the device. To work around this, create two identical user groups and assign the preproduction track as "available" to one and "required" to the other. The result will be that the preproduction track successfully deploys to the device.
## Assign an app

Expand All @@ -85,10 +85,10 @@ The following table lists the various options when *assigning* apps to users and
> - To configure what happens to managed apps when devices are no longer managed, you can select the intended setting under **Uninstall on device removal**. For more information, see [App uninstall setting for iOS/iPadOS managed apps](apps-deploy.md#app-uninstall-setting-for-ios-managed-apps).
> - If you have created an iOS/iPadOS VPN profile that contains per-app VPN settings, you can select the VPN profile under **VPN**. When the app is run, the VPN connection is opened. For more information, see [VPN settings for iOS/iPadOS devices](../configuration/vpn-settings-ios.md).
> - To configure whether a required iOS/iPadOS app is installed as a removable app by end users, you can select the setting under **Install as removable**.
> - To configure a way to prevent the iCloud backup of the managed iOS/iPadOS app, you can click on one of the following settings after adding a group assignment - VPN, or Uninstall on device removal, or Install as removable. Then, configure the setting called Prevent iCloud app backup. For more information, see [Prevent iCloud app backup setting for iOS/iPadOS and macOS apps](#prevent-icloud-app-backup-setting-for-iosipados-and-macos-apps).
> - To configure a way to prevent the iCloud backup of the managed iOS/iPadOS app, you can select on one of the following settings after adding a group assignment - VPN, or Uninstall on device removal, or Install as removable. Then, configure the setting called Prevent iCloud app backup. For more information, see [Prevent iCloud app backup setting for iOS/iPadOS and macOS apps](#prevent-icloud-app-backup-setting-for-iosipados-and-macos-apps).
>
> **For macOS apps only**:
> - To configure a way to prevent the iCloud backup of the managed macOS app, you can click on one of the following settings after adding a group assignment - VPN, or Uninstall on device removal, or Install as removable. Then, configure the setting called Prevent iCloud app backup. For more information, see [Prevent iCloud app backup setting for iOS/iPadOS and macOS apps](#prevent-icloud-app-backup-setting-for-iosipados-and-macos-apps).
> - To configure a way to prevent the iCloud backup of the managed macOS app, you can select on one of the following settings after adding a group assignment - VPN, or Uninstall on device removal, or Install as removable. Then, configure the setting called Prevent iCloud app backup. For more information, see [Prevent iCloud app backup setting for iOS/iPadOS and macOS apps](#prevent-icloud-app-backup-setting-for-iosipados-and-macos-apps).
>
> **For Android apps only**:
> - If you deploy an Android app as **Available with or without enrollment**, reporting status will only be available on enrolled devices.
Expand Down Expand Up @@ -135,6 +135,8 @@ The information in the following table can help you understand the resulting int
|User Uninstall|Device Required|Both exist, Intune resolves Required|
|User Uninstall|Device Uninstall|Both exist, Intune resolves Uninstall|
|Device Required|Device Uninstall|Required|
|Device Required|Device Available|Required and Available|
|Device Available|Device Uninstall|Uninstall|
|User Required and Available|User Available|Required and Available|
|User Required and Available|User Uninstall|Required and Available|
|User Required and Available|Device Required|Both exist, Required and Available
Expand All @@ -148,10 +150,10 @@ The information in the following table can help you understand the resulting int
> [!NOTE]
> For managed iOS store apps only, when you add these apps to Microsoft Intune and assign them as **Required**, the apps are automatically created with both **Required** and **Available** intents.<br><br>
> iOS Store apps (not iOS/iPadOS VPP apps) that are targeted with required intent will be enforced on the device at the time of the device check-in and will also show in the Company Portal app.<br><br>
> When conflicts occur in **Uninstall on device removal** setting, the app is not removed from the device when the device is no longer managed.
> When conflicts occur in **Uninstall on device removal** setting, the app isn't removed from the device when the device is no longer managed.
> [!NOTE]
> Apps deployed as Required to corporate-owned work profile and corporate-owned fully managed devices cannot be uninstalled manually by the user.
> Apps deployed as Required to corporate-owned work profile and corporate-owned fully managed devices can't be uninstalled manually by the user.
## Managed Google Play app deployment to unmanaged devices

Expand Down
4 changes: 2 additions & 2 deletions memdocs/intune/configuration/custom-settings-linux.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ keywords:
author: MandiOhlinger
ms.author: mandia
manager: dougeby
ms.date: 05/15/2024
ms.date: 01/09/2025
ms.topic: conceptual
ms.service: microsoft-intune
ms.subservice: configuration
Expand Down Expand Up @@ -61,7 +61,7 @@ This article lists the steps to add an existing script and has a GitHub repo wit

- **Execution context**: Select the context the script is executed in. Your options:
- **User** (default): When a user signs in to the device, the script runs. If a user never signs into the device, or there isn't any user affinity, then the script doesn't run.
- **Root**: The script always runs (with or without users logged in) at the device level.
- **Root**: The script always runs (with or without users logged in) at the device level. The first time the script executes, the end user might have to consent. After they consent, it should continue to execute on its schedule.

- **Execution frequency**: Select how frequently the script is executed. The default is **Every 15 minutes**.

Expand Down
8 changes: 1 addition & 7 deletions memdocs/intune/fundamentals/remote-help-android.md
Original file line number Diff line number Diff line change
Expand Up @@ -233,13 +233,7 @@ In this section:
> [!IMPORTANT]
> If the device is running in kiosk mode, the Settings app (which is where the permission is granted) needs to be designated as a system app so that it can launch. See [Granting overlay permissions to Managed Home Screen for Android Enterprise dedicated devices](https://techcommunity.microsoft.com/t5/intune-customer-success/granting-overlay-permissions-to-managed-home-screen-for-android/ba-p/3247041) for detailed instructions.
The Remote Help app needs the **Display over other apps** or **Appear on top** permission to display the Remote Help session UI. To grant this permission, complete the following steps:

1. After installing the Remote Help app, launch it.

2. If the permission isn't already granted, the app displays a prompt that launches **Settings** to grant the permission.

3. Tap **Grant** on the prompt, scroll down to **Appear on top** and turn the setting **On**. (The specific UI may differ depending on your device.)
The Remote Help app needs the **Display over other apps** or **Appear on top** permission to display the Remote Help session UI. To grant this permission, create an OEMConfig profile that configures the permissions in the OEMConfig app.

##### Knox KLMS Agent consent

Expand Down
Loading

0 comments on commit 42d43df

Please sign in to comment.