You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|Microsoft Windows App|[iOS](https://apps.apple.com/us/app/remote-desktop-mobile/id714464092)|✔|✔ see [Configure device redirection](/azure/virtual-desktop/client-device-redirection-intune).|✖|N/A|N/A|N/A|N/A|✖|
94
+
|Microsoft Windows App|[Android](https://play.google.com/store/apps/details?id=com.microsoft.rdc.androidx)|✔|✔ see [Manage device redirection](/windows-app/manage-device-redirection-intune).|✖|N/A|N/A|N/A|N/A|✖|
95
+
|Microsoft Windows App|[iOS](https://apps.apple.com/us/app/remote-desktop-mobile/id714464092)|✔|✔ see [Manage device redirection](/windows-app/manage-device-redirection-intune).|✖|N/A|N/A|N/A|N/A|✖|
|Microsoft Teams|[Android](https://play.google.com/store/apps/details?id=com.microsoft.teams)|✔|No settings|✔|N/A|✔|✔|✔|✔ Supported for v1416/1.0.0.2023226005 (2023226050) or later|
Copy file name to clipboardExpand all lines: intune/intune-service/apps/apps-win32-prepare.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,6 +28,9 @@ ms.collection:
28
28
29
29
Before you can add a Win32 app to Microsoft Intune, you must prepare the app by using the [Microsoft Win32 Content Prep Tool](https://go.microsoft.com/fwlink/?linkid=2065730).
30
30
31
+
> [!TIP]
32
+
> As a companion to this article, see our [Intune app protection for Windows 10/11 setup guide](https://go.microsoft.com/fwlink/?linkid=2309605) to review best practices and learn to enforce policies, deploy apps, and protect corporate data across a variety of devices. For a customized experience based on your environment, you can access the [Intune app protection for Windows 10/11 guide](https://go.microsoft.com/fwlink/?linkid=2309606) in the Microsoft 365 admin center.
33
+
31
34
## Prerequisites
32
35
33
36
To use Win32 app management, be sure you meet the following criteria:
Copy file name to clipboardExpand all lines: intune/intune-service/configuration/device-restrictions-android-aosp.md
+8-22Lines changed: 8 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ keywords:
7
7
author: MandiOhlinger
8
8
ms.author: mandia
9
9
manager: dougeby
10
-
ms.date: 04/15/2025
10
+
ms.date: 05/14/2025
11
11
ms.topic: reference
12
12
ms.service: microsoft-intune
13
13
ms.subservice: configuration
@@ -31,16 +31,14 @@ ms.collection:
31
31
32
32
# Android (AOSP) device settings to allow or restrict features using Templates in Intune
33
33
34
-
This article describes the different settings you can control on Android (AOSP) devices using Templates. You can use these restrictions to configure password requirements and access to device features.
34
+
This article lists and describes the different settings you can configure on Android (AOSP) devices using templates in Microsoft Intune. Settings can be configured using **Templates** or the **[settings catalog](settings-catalog.md)**. This article focuses on the templates.
35
35
36
-
Settings can be configured either through **Templates** or **Settings catalog**. For more information on **Settings catalog**, go to [Settings catalog](settings-catalog.md).
37
-
38
-
The settings outlined below can be found as **Templates** under **Devices** > **Manage devices** > **Configuration** > **Create** > **New policy** > **Android Enterprise** > **Templates**.
36
+
You can use these restrictions to configure password requirements and access to device features.
39
37
40
38
> [!NOTE]
41
39
>
42
-
>- If you can't find a setting in **Templates**, select **Settings catalog**. The settings catalog is a list of the settings you can configure for Android (AOSP) devices. It includes additional settings that you can configure that are not available under **Templates**.
43
-
>-If you can't find a setting in **Settings catalog**, check **Templates**.
40
+
>- If you can't find a setting in templates, then look for the setting in the settings catalog. It can include more settings that aren't available in templates. If you can't find a setting in the settings catalog, then look at the template settings.
41
+
>-Device configuration profiles aren't supported on Microsoft Teams devices running AOSP.
44
42
45
43
This feature applies to:
46
44
@@ -49,21 +47,9 @@ This feature applies to:
49
47
50
48
## Before you begin
51
49
52
-
1. Sign in to the [Microsoft Intune admin center](https://go.microsoft.com/fwlink/?linkid=2109431).
Copy file name to clipboardExpand all lines: intune/intune-service/configuration/wi-fi-settings-windows.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ keywords:
7
7
author: MandiOhlinger
8
8
ms.author: mandia
9
9
manager: dougeby
10
-
ms.date: 06/25/2024
10
+
ms.date: 05/15/2025
11
11
ms.topic: reference
12
12
ms.service: microsoft-intune
13
13
ms.subservice: configuration
@@ -147,7 +147,7 @@ Enterprise profiles use Extensible Authentication Protocol (EAP) to authenticate
147
147
-**EAP-TLS**: Also enter:
148
148
149
149
-**Certificate server names**: Enter one or more common names used in the certificates issued by your trusted certificate authority (CA). If you enter this information, you can bypass the dynamic trust dialog shown on user devices when they connect to this Wi-Fi network.
150
-
-**Root certificates for server validation**: Select one or more existing trusted root certificate profiles. When the client connects to the network, these certificates are used to establish a chain of trust with the server. If your authentication server uses a public certificate, then you don't need to include a root certificate.
150
+
-**Root certificates for server validation**: Select one or more existing trusted root certificate profiles. When the client connects to the network, these certificates are used to establish a chain of trust with the server. If your authentication server uses a public certificate that's already installed on your device, then you don't need to include a root certificate.
151
151
-**Authentication method**: Select the authentication method used by your device clients. Your options:
152
152
153
153
-**SCEP certificate**: Select the SCEP client certificate profile that is also deployed to the device. This certificate is the identity presented by the device to the server to authenticate the connection.
@@ -157,7 +157,7 @@ Enterprise profiles use Extensible Authentication Protocol (EAP) to authenticate
157
157
-**EAP-TTLS**: Also enter:
158
158
159
159
-**Certificate server names**: Enter one or more common names used in the certificates issued by your trusted certificate authority (CA). If you enter this information, you can bypass the dynamic trust dialog shown on user devices when they connect to this Wi-Fi network.
160
-
-**Root certificates for server validation**: Select one or more existing trusted root certificate profiles. When the client connects to the network, these certificates are used to establish a chain of trust with the server. If your authentication server uses a public certificate, then you don't need to include a root certificate.
160
+
-**Root certificates for server validation**: Select one or more existing trusted root certificate profiles. When the client connects to the network, these certificates are used to establish a chain of trust with the server. If your authentication server uses a public certificate that's already installed on your device, then you don't need to include a root certificate.
161
161
-**Authentication method**: Select the authentication method used by your device clients. Your options:
162
162
163
163
-**Username and Password**: Prompt the user for a user name and password to authenticate the connection. Also enter:
@@ -181,7 +181,7 @@ Enterprise profiles use Extensible Authentication Protocol (EAP) to authenticate
181
181
182
182
-**Certificate server names**: Enter one or more common names used in the certificates issued by your trusted certificate authority (CA). If you enter this information, you can bypass the dynamic trust dialog shown on user devices when they connect to this Wi-Fi network.
183
183
184
-
-**Root certificates for server validation**: Select one or more existing trusted root certificate profiles. When the client connects to the network, these certificates are used to establish a chain of trust with the server. If your authentication server uses a public certificate, then you don't need to include a root certificate.
184
+
-**Root certificates for server validation**: Select one or more existing trusted root certificate profiles. When the client connects to the network, these certificates are used to establish a chain of trust with the server. If your authentication server uses a public certificate that's already installed on your device, then you don't need to include a root certificate.
185
185
186
186
-**Perform server validation**: When set to **Yes**, in PEAP negotiation phase 1, devices validate the certificate, and verify the server. Select **No** to block or prevent this validation. When set to **Not configured**, Intune doesn't change or update this setting.
Copy file name to clipboardExpand all lines: intune/intune-service/enrollment/android-aosp-corporate-owned-user-associated-enroll.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -79,7 +79,7 @@ Create an enrollment profile to enable enrollment on devices.
79
79
If you select **WEP Pre-shared key** or **WPA Pre-shared key**, also enter:
80
80
81
81
-**Pre-shared key**: The pre-shared key that's used to authenticate with the network.
82
-
-**For Microsoft Teams devices (preview)**: Select **Enabled** if this profile is applicable for Microsoft Teams Android devices. This setting should only be used for [Microsoft Teams Android devices](/microsoftteams/devices/teams-ip-phones).
82
+
-**For Microsoft Teams devices**: Select **Enabled** if this profile is applicable for Microsoft Teams Android devices. This setting should only be used for [Microsoft Teams Android devices](/microsoftteams/devices/teams-ip-phones). You can enable this setting in one enrollment profile per tenant.
83
83
84
84
7. Select **Next** and optionally, select scope tags.
85
85
8. Select **Next**. Review the details of your profile and then select **Create** to save the profile.
0 commit comments