Skip to content

Commit 5b6e2c6

Browse files
Merge pull request #19136 from MicrosoftDocs/main
[AutoPublish] main to live - 11/14 13:30 PST | 11/15 03:00 IST
2 parents c920d72 + f00208b commit 5b6e2c6

File tree

2 files changed

+227
-153
lines changed

2 files changed

+227
-153
lines changed

intune/intune-service/fundamentals/in-development.md

Lines changed: 2 additions & 151 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: In development - Microsoft Intune
33
description: This article describes Microsoft Intune features that are in development.
44
author: brenduns
55
ms.author: brenduns
6-
ms.date: 10/27/2025
6+
ms.date: 11/13/2025
77
ms.topic: article
88
ms.reviewer: intuner
99
ms.collection:
@@ -54,26 +54,6 @@ Soon Endpoint Privilege Management (EPM) will support the use of [support approv
5454

5555
## App management
5656

57-
### More volume options available in Managed Home Screen<!-- 16462284 -->
58-
59-
We're adding more volume control options to the Managed Home Screen (MHS) app for Android Enterprise dedicated and fully managed devices. With this update, you can enable additional controls for call, ring, notification, and alarm volumes, giving users greater flexibility to adjust sound levels based on their needs.
60-
61-
> [!div class="checklist"]
62-
> Applies to:
63-
>
64-
> - Android Enterprise (dedicated and fully managed devices)
65-
66-
### Reset Managed Google Play store mode to Basic<!-- 33632857 -->
67-
68-
You'll soon be able to reset the Managed Google Play store layout from *Custom* back to *Basic* in the Intune admin center under **Apps** > **All apps** > **Create Managed Google Play app**.
69-
70-
In **Basic** mode, all approved apps are visible to users. In **Custom** mode, newly approved apps must be added to collections. When you reset to Basic, Intune deletes all existing collections. The **Reset to Basic** button appears only when the store is in Custom mode and shows immediate success or failure.
71-
72-
> [!div class="checklist"]
73-
> Applies to:
74-
>
75-
> - Android
76-
7757
### Added protection for iOS/iPadOS app widgets<!-- 14614429 -->
7858

7959
To protect organizational data for MAM managed accounts and apps, Intune app protection policies will soon provide the capability to block data sync from policy managed app data to app widgets. App widgets can be added to end-user's iOS/iPadOS device lock screen, which can expose data contained by these widgets, such as meeting titles, top sites, and recent notes. In Intune, you'll be able to set the app protection policy setting **Sync policy managed app data with app widgets** to **Block** for iOS/iPadOS apps. This setting will be available as part of the **Data Protection** settings in app protection policies. This new setting will be an app protection feature similar to the **Sync policy managed app data with native app or add-ins** setting.
@@ -87,45 +67,6 @@ To protect organizational data for MAM managed accounts and apps, Intune app pro
8767

8868
## Device configuration
8969

90-
### Settings available in both Templates and Settings Catalog for Android Enterprise <!-- 34876806 -->
91-
92-
Some settings that were only available in Templates are now also supported in the settings catalog.
93-
94-
The [settings catalog](../configuration/settings-catalog.md) lists all the settings you can configure in a device policy, and all in one place. For more information about configuring settings catalog profiles in Intune, see [Create a policy using settings catalog](../configuration/settings-catalog.md).
95-
96-
To create a new settings catalog policy, go to **Devices** > **Manage devices** > **Configuration** > **Create** > **New policy** > **Android Enterprise** for platform > **Settings catalog** for profile type.
97-
98-
The following settings are available in the settings catalog:
99-
100-
**General**:
101-
102-
- Skip first use hints
103-
- Contact sharing via Bluetooth (work profile level)
104-
- Search work contacts and display work contact caller-id in personal profile
105-
- Data sharing between work and personal profiles
106-
107-
**Work profile password**:
108-
109-
- Required password type
110-
- Minimum password length
111-
- Number of characters required
112-
- Number of lowercase characters required
113-
- Number of uppercase characters required
114-
- Number of non-letter characters required
115-
- Number of numeric characters required
116-
- Number of symbol characters required
117-
- Number of days until password expires
118-
- Number of passwords required before user can reuse a password
119-
- Number of sign-in failures before wiping device
120-
- Required unlock frequency
121-
122-
To learn more about these settings, go to [Android Intune settings catalog settings list](../configuration/settings-catalog-android.md).
123-
124-
> [!div class="checklist"]
125-
> Applies to:
126-
>
127-
> - Android Enterprise
128-
12970
### Recovery Lock settings catalog settings are available for macOS<!-- 32541429 -->
13071

13172
On macOS devices, you can configure a recovery OS password that prevents users from booting company-owned devices into recovery mode, reinstalling macOS, and bypassing remote management.
@@ -141,55 +82,12 @@ In a [settings catalog](../configuration/settings-catalog.md) policy, you can us
14182
>
14283
> - macOS
14384
144-
### New Assist Content Sharing setting in the Android Enterprise settings catalog<!-- 31479342 -->
145-
146-
The [Settings Catalog](../configuration/settings-catalog.md) lists all the settings you can configure in a device policy, and all in one place. For more information about configuring Settings Catalog profiles in Intune, see [Create a policy using settings catalog](../configuration/settings-catalog.md).
147-
148-
There are new settings (**Devices** > **Manage devices** > **Configuration** > **Create** > **New policy** > **Android Enterprise** for platform > **Settings catalog** for profile type):
149-
150-
- **Block assist content sharing with privileged apps**: If **True**, this setting blocks assist content, like screenshots and app details, from being sent to a privileged app, like an assistant app. The setting can be used to block the **Circle to Search** AI feature.
151-
152-
> [!div class="checklist"]
153-
> Applies to:
154-
>
155-
> - Android Enterprise corporate-owned devices with a work profile (COPE) > Work profile level
156-
> - Android Enterprise corporate owned fully managed (COBO)
157-
> - Android Enterprise corporate owned dedicated devices (COSU)
158-
15985
<!-- *********************************************** -->
16086

16187
## Device enrollment
16288

163-
### New opt-in upgrade to allow existing customers to move from managed Google Play Accounts to Microsoft Entra ID accounts <!-- 30675087 -->
164-
165-
Microsoft Intune will offer a new opt-in upgrade that allows existing Android Enterprise customers to move from using managed Google Play accounts to using Microsoft Entra ID accounts for Android device management. Customers are eligible if they previously used a managed Google Play account. This better together enterprise (BTE) integration streamlines the onboarding process by eliminating the need for a separate Google account and leveraging your work account. It's not required to switch account types.
166-
167-
To learn more about this change, see [New onboarding flow to managing Android Enterprise devices with Microsoft Intune](https://techcommunity.microsoft.com/blog/intunecustomersuccess/new-onboarding-flow-to-managing-android-enterprise-devices-with-microsoft-intune/4206602).
168-
169-
170-
### New Setup Assistant screens to be generally available for iOS/iPadOS and macOS automated device enrollment profiles <!-- 29832295, 29611787 -->
171-
172-
As an IT admin, you'll be able to hide or show 12 new Setup Assistant screens during automated device enrollment (ADE). The default is to show these screens during Setup Assistant.
173-
174-
The screens you can skip during iOS/iPadOS enrollment, and the applicable versions include:
175-
- **App Store** (iOS/iPadOS 14.3+)
176-
- **Camera button** (iOS/iPadOS 18+)
177-
- **Web content filtering** (iOS/iPadOS 18.2+)
178-
- **Safety and handling** (iOS/iPadOS 18.4+)
179-
- **Multitasking** (iOS/iPadOS 26+)
180-
- **OS Showcase** (iOS/iPadOS 26+)
181-
182-
The screens you can skip during macOS enrollment include:
183-
- **App Store** (macOS 11.1+)
184-
- **Get Started** (macOS 15+)
185-
- **Software update** (macOS 15.4+)
186-
- **Additional privacy settings** (macOS 26+)
187-
- **OS Showcase** (macOS 26+)
188-
- **Update completed** (macOS 26+)
189-
- **Get Started** (macOS 15+)
190-
19189
### Configure Windows Backup for Organizations<!--29202026 -->
192-
90+
q
19391
A new feature called *Windows Backup for Organizations* will soon be generally available in Microsoft Intune. With this feature, you can back up your organization's Windows settings and restore them on a Microsoft Entra joined device. Backup settings will be configurable in the Microsoft Intune admin center settings catalog, while a tenant-wide setting that lets you restore a device will be available in the admin center under **Enrollment**. For more information about this feature, see [Windows Backup for Organizations in Microsoft Intune](../enrollment/windows-backup-restore.md).
19492

19593
<!-- *********************************************** -->
@@ -208,57 +106,10 @@ For more information, see the following articles:
208106
- [Windows 365 Cloud Apps | Microsoft Learn](/windows-365/enterprise/cloud-apps)
209107
- [Use Autopilot device preparation with Cloud PCs | Microsoft Learn](/windows-365/enterprise/autopilot-device-preparation)
210108

211-
### New prompts available to explore your Intune data<!-- 33787582 -->
212-
213-
You can use Security Copilot in Intune to explore new prompts related to your data using natural language. Use these new prompts to view data on:
214-
215-
- Users and groups
216-
- Role based access control (RBAC)
217-
- Audit logs
218-
219-
When you start typing your request, a list of prompts that best match your request are shown. You can also continue typing for more suggestions.
220-
221-
Each query returns a Copilot summary to help you understand the results and offers suggestions. With this information, you can also:
222-
223-
- Add devices or users from the results to a group so you can target apps and policies to this group.
224-
- Filter example queries to find or build requests that match your needs.
225-
226-
To learn more, see [Explore Intune data with natural language and take action](../copilot/copilot-intune-explorer.md).
227-
228-
### Device Management type assignment filter property supports more Android enrollment options<!-- 33016364 -->
229-
230-
When you create a policy in Intune, you can use [assignment filters](filters.md) to assign a policy based on rules you create. You can create a rule using different [app properties](filters-device-properties.md), like `deviceManagementType`.
231-
232-
The Device Management Type property supports the following Android enrollment options for managed devices:
233-
234-
- Corporate-owned dedicated devices with Entra ID Shared mode
235-
- Corporate-owned dedicated devices without Entra ID Shared mode
236-
- Corporate-owned with work profile
237-
- Corporate-owned fully managed
238-
- Personal-owned device with a work profile
239-
- AOSP user-associated devices
240-
- AOSP userless devices
241-
242-
To learn more about filters and the properties you can currently use, see:
243-
244-
- [Use filters when assigning your apps, policies, and profiles in Microsoft Intune](filters.md)
245-
- [App and device properties, operators, and rule editing when creating filters in Microsoft Intune](filters-device-properties.md)
246-
247-
> [!div class="checklist"]
248-
> Applies to:
249-
>
250-
> - Android
251-
252109
<!-- *********************************************** -->
253110

254111
## Device security
255112

256-
### Microsoft Tunnel for detection and protection for rooted Android devices<!-- 30336962 -->
257-
258-
We’re updating Microsoft Tunnel with the capability to detect and block access from rooted Android devices. This update will ensure that only compliant and trustworthy devices can establish secure connections through the Tunnel.
259-
260-
This new capability will be available with Microsoft Tunnel for [Mobile Device Management](/intune/intune-service/protect/microsoft-tunnel-overview) (MDM) and for [Mobile Application Management](/intune/intune-service/protect/microsoft-tunnel-mam) (MAM).
261-
262113
### Updated firewall configurations for new Intune network endpoints<!-- 34445623 -->
263114

264115
As part of Microsoft's ongoing [Secure Future Initiative (SFI)]( https://www.microsoft.com/trust-center/security/secure-future-initiative), network service endpoints for Microsoft Intune will be moving to new IP addresses. As a result, customers might need to update network (firewall) configurations in third-party applications to enable proper function of Intune device and app management. This change will affect customers using a firewall allowlist that allows outbound traffic based on IP addresses or Azure service tags.

0 commit comments

Comments
 (0)