Blog Post

Microsoft Intune Blog
3 MIN READ

What’s new in Microsoft Endpoint Manager – 2110 (October) edition

Ramya_Chitrakar's avatar
Oct 21, 2021

New updates to the experience for Android and iOS users this month show our continued investment in your organization’s productivity across all device types. See the complete list in the What’s New in Endpoint Manager for 2110 (October) release for details. As usual, I appreciate your feedback. Comment on this post, connect with me on LinkedIn, or tag @RamyaChitrakar on Twitter.

Android Open Source Project (AOSP) device management helps frontline workers collaborate while providing company data security through Endpoint Manager

Earlier this week we announced that Endpoint Manager will now manage and protect devices that run AOSP without Google Mobile Services (GMS). RealWear will be the first device run on the AOSP platform and are used largely to provide frontline workers with a way to collaborate using Teams in a safe, hands-free manner. The management capabilities that are releasing in public preview include the ability to provision devices as user-associated devices or shared devices and the ability to deploy device configuration and compliance policies. AOSP is a new enrollment type so IT admins can target specific enrollment profiles with policies specific to the data protection and user scenario needs that specialty devices may have without impacting Android Device Administrator and Android Enterprise managed devices. For more on AOSP management, see:

Public preview of Shared iPadOS settings to support temporary sessions

Do you use shared iPads in your work environment? I often see them in medical offices, manufacturing plants, and schools. While this model helps reduce costs, it also increases the need to enhance an organization’s security posture to avoid new risks that have been introduced.

For those of you who are using or deploying shared iPads, we’re introducing settings for iPadOS that support temporary sessions on shared iPads. These new settings have targeted policies and apps, and the settings can then be erased upon sign-out. Each time a user signs into a temporary session, it will be like signing into a new device, and a managed Apple ID is not required.

Configuring these settings gives you greater security for shared iPads. For iPadOS 13.0 and higher, in Shared iPad mode you can set the maximum seconds of screen lock before a password is required. For iPadOS 14.5 and later, in Shared iPad mode you’ll also be able to configure a guest welcome pane and set the maximum seconds of inactivity until the user is logged out.

Here is where you configure the settings in the Endpoint Manager admin center:

And here’s what the user sees when they are ready to sign on to the shared iPad:


Learn more about Endpoint Manager updates for new Apple systems.

Let us know what you think

Next month is Microsoft Ignite and you know what that brings – lots of new videos, customer stories, and more! I’ll do a special "What’s new for Microsoft Ignite" to reflect on all we’ve shared. As always, share your feedback so we can continue to invest in improving the user experience and simplifying IT administration in ways that align with your biggest needs. Please share comments, questions, and feedback by commenting on this post, connecting with me on LinkedIn, or tagging @RamyaChitrakar on Twitter.

 

Updated Oct 22, 2021
Version 3.0
  • Hi MichaelOliv, thanks for the feedback and we’re sorry to hear you’re experiencing this.

     

    By default, Apple Automated Device Enrollment (ADE) devices enroll with their device type set for the device name (e.g. “iPad”, “iPhone”, “MacBook Air”). If an Apple device name template is configured within your Enrollment program token profile, just note that you may need to target the device with your enrollment profile, so that the naming format for devices can be automatically applied when they're enrolled and upon each successive check-in.

     

    Re: Maximum seconds of inactivity until temporary session logs out (preview) –

    If the “Require Shared iPad temporary session only (preview)” setting is set to “Yes”, this setting cancels out the following shared iPad settings, because they are not applicable in temporary sessions:

    Maximum cached users

    Maximum seconds after screen lock before password is required

    Maximum seconds of inactivity until user session logs out

     

    Note: To alter or change a Shared iPads configuration to not have temporary sessions, the device will need to be fully reset and a new enrollment profile with the updated configurations will need to be sent down to the iPad.

     

    More information about Apple’s Automated Device Enrollment can be found in our docs here.

     

    If you continue facing an issue where your Maximum seconds of inactivity until temporary session logs out (preview) or device name template policies are not working or applying as expected, please open a support request via the Microsoft Endpoint Manager admin center's Help and Support blade or any of the methods here, as this will help the team capture all the information needed to resolve this issue!

  • MichaelOliv's avatar
    MichaelOliv
    Iron Contributor

    I try this mode and I see something. In this mode it seems the "Device Name Template" not working.

    After enrolment I have "iPad (5th generation)" instead of {{DEVICETYPE}}-{{SERIAL}}

     

    Other thing.

    I attribute a configuration to this test ipad. After that, the temporary session never log out automatically. In the enrolment profile I set 300 seconds in "Maximum seconds of inactivity until temporary session logs out (preview)". It was working before the configuration succeeded. Not anymore after.

     

    Maybe something in my configuration. Not find for the moment.

     

    It is possible to change this time without change the enrolment profil, wipe the device and enrol again please? 

     

    This system could anwser some need in my company. We are not federate.