Home
%3CLINGO-SUB%20id%3D%22lingo-sub-986301%22%20slang%3D%22en-US%22%3EPrivacy%20gets%20a%20boost%20with%20support%20for%20Apple%20User%20Enrollment%26nbsp%3Bin%20Microsoft%20Endpoint%20Manager%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-986301%22%20slang%3D%22en-US%22%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EMicrosoft%20is%20delighted%20to%20announce%20support%20for%20iOS%20User%20Enrollment%20with%20the%20release%20of%20Apple%20iOS%2013.1%20and%20iPadOS.%20This%20feature%20is%20currently%20available%20in%20public%20preview%20with%20Microsoft%20Endpoint%20Manager%2C%20including%20Microsoft%20Intune.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAt%20Microsoft%2C%20we%20take%20end%20user%20privacy%20seriously%20and%20have%20long%20offered%20the%20choice%20of%20using%20managed%20apps%20or%20managing%20the%20entire%20device%20for%20bring-your-own-device%20(BYOD)%20users.%20Microsoft%20is%20delighted%20to%20enhance%20our%20best-in-class%20spectrum%20of%20BYOD%20offerings%20on%20iOS%20and%20iPadOS%20with%20User%20Enrollment.%20Apple%20introduced%20User%20Enrollment%20as%20a%20new%20type%20of%20lightweight%20enrollment%20in%20iOS%2013.1%20and%20iPadOS%20designed%20to%20meet%20a%20couple%20of%20goals%20--%20%26nbsp%3Bnamely%2C%20how%20to%20help%20IT%20keep%20corporate%20data%20safe%20with%20critical%20device%20enrollment%20features%20and%20protect%20end%20user%20privacy%20on%20their%20personal%20devices.%20We%E2%80%99re%20excited%20to%20extend%20Apple%E2%80%99s%20User%20Enrollment%20with%20the%20data%20protection%20afforded%20by%20Intune%20App%20Protection%20Policies%20to%20enable%20IT%20to%20use%20the%20most%20crucial%20device%20management%20features%20while%20maintaining%20trust%20and%20privacy%20for%20end%20users.%20Microsoft%20Endpoint%20Manager%20pairs%20the%20platform%E2%80%99s%20lightweight%20management%20experience%20with%20the%20intuitive%20enrollment%20experience%20that%20people%20love%20in%20the%20Microsoft%20Company%20Portal%20app%20(thank%20you%20for%20our%204.5%20star%20rating%20in%20the%20App%20Store!)%2C%20to%20create%20an%20easy%20on-boarding%20experience.%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F155226i6A3453BFC537F8D1%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%22clipboard_image_0.jpeg%22%20title%3D%22clipboard_image_0.jpeg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EEvery%20organization%20is%20unique%2C%20and%20they%20generally%20have%20end%20users%20with%20a%20variety%20of%20different%20expectations%20and%20use%20cases.%20Microsoft%20supports%20the%20full%20spectrum%20of%20device%20management%20and%20data%20protection%20choices%20to%20support%20these%20needs%20%E2%80%93%20from%20managed%20apps%2C%20User%20Enrollment%2C%20and%20Device%20Enrollment%20for%20personally-owned%20devices%20to%20Automated%20Device%20Enrollment%20for%20supervised%2C%20corporate-owned%20devices.%20On%20personally-owned%20devices%2C%20Microsoft%20Intune%20app%20protection%20policies%20provide%20IT%20the%20ability%20to%20prevent%20data%20leaks%20from%20protected%20apps%20while%20leveraging%20support%20for%20multiple%20identities%20to%20provide%20end%20users%20with%20complete%20trust%20that%20their%20privacy%20is%20protected.%20We%20believe%20our%20customers%20can%20get%20the%20best%20of%20both%20worlds%20when%20we%20pair%20the%20proven%20capabilities%20of%20Intune%20app%20protection%20policies%20with%20the%20platform%20capabilities%20of%20User%20Enrollment.%20Together%2C%20the%20two%20provide%20significant%20granular%20control%20over%20Intune%20protected%20apps%20such%20as%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fintune%2Fapps%2Fapps-supported-intune-apps%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EOffice%20365%20and%20other%20mobile%20apps%3C%2FA%3E%2C%20whether%20downloaded%20by%20end%20users%20or%20provided%20by%20IT%2C%20paired%20with%20the%20ability%20to%20use%20crucial%20device%20management%20features%20like%20a%206-digit%20non-simple%20device%20PIN%2C%20required%20app%20deployment%20with%20VPN%20to%20corporate%20resources%20on%20end%20user%20devices%2C%20and%20provisioning%20Wi-Fi%20access%20on%20personal%20devices.%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F155225i065FAF57FEC87094%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%22clipboard_image_1.png%22%20title%3D%22clipboard_image_1.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-1852590624%22%20id%3D%22toc-hId-1852590624%22%3EPlacing%20the%20user%20in%20control%20of%20their%20enrollment%20experience%3C%2FH2%3E%0A%3CP%3EIntune%20has%20taken%20an%20innovative%20approach%20to%20User%20Enrollment%20by%20putting%20the%20user%20in%20control%20of%20their%20device%20enrollment%20experience.%20When%20targeted%20by%20their%20IT%20admin%2C%20the%20user%20is%20asked%20whether%20the%20device%20belongs%20to%20them%20or%20their%20organization.%20If%20the%20device%20belongs%20to%20the%20user%2C%20they%20are%20provided%20with%20the%20option%20of%20securing%20the%20entire%20device%20(Device%20Enrollment)%20or%20securing%20work-related%20apps%20and%20data%20(User%20Enrollment).%20This%20is%20a%20distinct%20evolution%20in%20the%20enrollment%20experience%20which%20provides%20end%20users%20with%20the%20agency%20to%20determine%20the%20level%20of%20control%20their%20organization%20has%20over%20their%20personally-owned%20devices.%3C%2FP%3E%0A%3CP%3EOur%20user%20studies%20have%20indicated%20that%20the%20ability%20to%20determine%20the%20level%20of%20protection%20applied%20to%20their%20device%20is%20important%20or%20very%20important%20to%20end%20users.%20100%25%20of%20users%20who%20participated%20in%20our%20study%20reported%20that%20the%20Microsoft%20end%20user%20experience%20for%20User%20Enrollment%20made%20it%20clear%20to%20them%20that%20their%20company%20cannot%20access%20personal%20data%20on%20their%20devices.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThis%20is%20a%20common%20hesitation%20among%20end%20users%2C%20as%20one%20respondent%20put%20it%20best%3A%20%E2%80%9CEvery%20person%20within%20the%20company%20should%20only%20have%20access%20to%20specific%20information%2C%20they%26nbsp%3Bshouldn%E2%80%99t%20have%20everything.%20Security%20(team)%20is%20primarily%20making%20sure%20that%20what%20you%2C%20as%20an%26nbsp%3Bemployee%2C%20are%20responsible%20for%20is%20secure%20within%20your%20profile.%20The%20enrollment%26nbsp%3Bthing%20is%20just%20raising%20your%20hand%20to%20say%2C%20%E2%80%98Yes%20I%20volunteer%20to%20do%20this%E2%80%99.%20This%20(enrollment)%20is%20just%20you%20validating%20and%20choosing%20what%20data.%20%E2%80%9C%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EParticularly%20in%20today%E2%80%99s%20environment%2C%20users%20care%20deeply%20about%20their%20privacy.%20By%20enabling%20end%20users%20to%20choose%20the%20type%20of%20enrollment%20that%20makes%20sense%20to%20them%2C%20IT%20can%20continue%20to%20build%20trust%20with%20users%2C%20while%20maintaining%20secure%20control%20over%20organizational%20data.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F155224iD6709412ADC77495%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%22clipboard_image_2.png%22%20title%3D%22clipboard_image_2.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--699566337%22%20id%3D%22toc-hId--699566337%22%3EEnrollment%20targeting%E2%80%93%20simple%20and%20flexible%20configuration%3C%2FH2%3E%0A%3CP%3EYou%20will%20find%20the%20process%20to%20get%20started%20with%20User%20Enrollment%20is%20quite%20simple%20and%20provides%20you%20with%20significant%20flexibility%20in%20how%20you%20provide%20choice%20of%20enrollment%20types%20to%20your%20iOS%20and%20iPadOS%20users.%20First%2C%20you%20will%20need%20to%20ensure%20you%20have%20a%20valid%20Apple%20Push%20Notification%20Service%20(APNS)%20certificate%20to%20manage%20Apple%20devices.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAfter%20that%2C%20you%20will%20set%20up%20managed%20Apple%20IDs%20in%20Apple%20Business%20Manager%20using%20federation%20with%20your%20instance%20of%20Microsoft%20Azure%20Active%20Directory.%20Microsoft%20Azure%20Active%20Directory%20is%20the%20only%20federation%20partner%20within%20Apple%20Business%20Manager%20for%20all%20management%20solutions.%20The%20Managed%20Apple%20ID%20provides%20access%20to%20Apple%20services%20associated%20with%20the%20organization%2C%20separate%20from%20the%20personal%20Apple%20ID%20the%20user%20may%20already%20use.%20User%20Enrollment%20creates%20a%20separate%20Apple%20File%20System%20(APFS)%20volume%20using%20this%20ID%20for%20managed%20accounts%2C%20apps%20and%20data%20on%20the%20device.%20This%20managed%20volume%20is%20cryptographically%20separated%20from%20the%20rest%20of%20the%20device.%20Managed%20Apple%20IDs%20are%20created%20automatically%20during%20enrollment%20when%20users%20sign%20in%20on%20a%20device%20with%20their%20corporate%20email%20address.%20You%20can%20find%20more%20guidance%20from%20Apple%20on%20this%20topic%20%3CA%20href%3D%22https%3A%2F%2Fsupport.apple.com%2Fguide%2Fapple-business-manager%2Fintro-to-federated-authentication-apdb19317543%2Fweb%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehere%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EUser%20Enrollment%20is%20designed%20for%20securely%20using%20personally%20owned%20devices%20for%20work%20apps%2C%20without%20giving%20up%20management%20of%20the%20entire%20device%20to%20organizations.%20IT%20can%20apply%20necessary%20configuration%20and%20policies%20such%20as%20requiring%20a%20passcode%20or%20deploying%20mandatory%20apps%2C%20but%20not%20have%20the%20ability%20to%20control%20the%20camera%20or%20access%20personal%20information.%20For%20company%20owned%20devices%20or%20particularly%20sensitive%20data%20access%20on%20personally%20owned%20devices%2C%20full%20device%20enrollment%20may%20still%20be%20the%20preferred%20management%20method.%20Within%20the%20Microsoft%20admin%20console%2C%20you%20can%20set%20up%20so%20end%20users%20can%20choose%20between%20User%20enrollment%20or%20Device%20enrollment%20at%20the%20time%20of%20enrollment.%20You%20can%20also%20specify%20the%20enrollment%20type%20if%20you%20wish%2C%20or%20have%20a%20mixed%20approach%20depending%20on%20user%20groups.%20Visit%20the%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fintune%2Fenrollment%2Fios-user-enrollment-supported-actions%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Edocumentation%3C%2FA%3E%20to%20learn%20more.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-1043243998%22%20id%3D%22toc-hId-1043243998%22%3EProtect%20corporate%20data%20in%20apps%20using%20Intune%20app%20protection%20policies%3C%2FH2%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Fgxcuf89792.i.lithium.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F155227i24D10E8DCB4F1701%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20alt%3D%22clipboard_image_3.png%22%20title%3D%22clipboard_image_3.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EUser%20Enrollment%20and%20App%20Protection%20Policies%20are%20a%20great%20example%20of%20two%20management%20features%20that%20are%20better%20together%20for%20your%20user%E2%80%98s%20personal%20devices%20accessing%20data%20in%20your%20organization.%20Both%20management%20options%20were%20designed%20to%20protect%20user%20privacy%2C%20and%20each%20solves%20unique%20management%20problems.%20User%20Enrollment%20allows%20IT%20to%20have%20control%20over%20a%20curated%20set%20of%20device%20management%20features.%20For%20instance%2C%20admins%20can%20set%20policies%20to%20enforce%20a%206%20digit%20non-simplePIN%20on%20the%20device%2C%20deploy%20Wi-Fi%20profiles%2C%20and%20distribute%20secured%20apps%20such%20as%20Microsoft%20Edge%20to%20the%20device.%20They%20can%20also%20push%20configuration%20for%20VPN%20access%20to%20on-premises%20corporate%20resources.%20In%20the%20past%2C%20these%20specific%20capabilities%20drove%20organizations%20that%20were%20considering%20App%20Protection%20Policies%20towards%20heavier-weight%20Device%20Management%20-%20including%20features%20like%20Device%20Wipe%20that%20end%20users%20were%20not%20always%20comfortable%20with.%20With%20the%20introduction%20of%20User%20Enrollment%2C%20admins%20can%20pair%20both%20management%20options%20together%20to%20provide%20a%20deeper%20and%20more%20robust%20BYOD%20solution.%20App%20Protection%20Policies%20allow%20users%20to%20continue%20to%20use%20the%20Office%20apps%20exactly%20as%20they%20do%20today%20and%20now.%26nbsp%3B%20They%20download%20the%20apps%20directly%20from%20the%20App%20Store%20and%20can%20use%20them%20across%20all%20aspects%20of%20their%20lives-%20whether%20for%20work%20or%20personal%20use.%20At%20Microsoft%2C%20we%20think%20it%20is%20crucial%20to%20enable%20this%20dual-use%20case%20and%20App%20Protection%20Policies%20provide%20your%20organization%20the%20ability%20to%20offer%20this%20best-in-class%20experience%20while%20also%20protecting%20your%20corporate%20data%20against%20leaks.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EApp%20Protection%20Policies%20target%20only%20the%20corporate%20account%20in%20protected%20apps%2C%20and%20the%20data%20is%20kept%20secure%20and%20separate%20from%20the%20personal%20account.%20In%20case%20the%20device%20is%20lost%20or%20the%20user%20leaves%20the%20organization%2C%20only%20the%20data%20in%20corporate%20account%20is%20wiped%20leaving%20the%20personal%20data%20in%20the%20same%20app%20on%20the%20personal%20partition%20of%20the%20device%20untouched.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--1508912963%22%20id%3D%22toc-hId--1508912963%22%3EConsiderations%20for%20deploying%20User%20Enrollment%20with%20Microsoft%3C%2FH2%3E%0A%3CP%3EThere%20are%20certain%20recommendations%20and%20alternatives%20that%20are%20good%20to%20know%20as%20you%20plan%20the%20roll-out%20of%20User%20Enrollment%20within%20your%20Microsoft%20managed%20device%20estate.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId-37383867%22%20id%3D%22toc-hId-37383867%22%3EConditional%20Access%3C%2FH3%3E%0A%3CP%3EConditional%20Access%20policies%20can%20be%20applied%20when%20users%20are%20targeted%20for%20User%20Enrollment%20and%20provide%20the%20most%20seamless%20experience%20for%20ensuring%20users%20are%20prompted%20to%20begin%20the%20enrollment%20process.%20These%20policies%20can%20be%20configured%20exactly%20the%20same%20way%20you%20configure%20policies%20for%20device%20enrollments%20today.%20Turning%20on%20Conditional%20Access%20will%20ensure%20your%20users%20are%20properly%20forced%20to%20enroll%20in%20whatever%20form%20of%20management%20you%20have%20defined%20before%20they%20can%20get%20access%20to%20online%20resources%20like%20Exchange%20and%20SharePoint%20Online.%20To%20enable%20these%20scenarios%2C%20your%20end%20users%20will%20be%20prompted%20to%20install%20the%20Microsoft%20Authenticator%20app%20to%20their%20device%20if%20it%20is%20not%20already%20present%20during%20User%20Enrollment.%20Learn%20more%20about%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fintune%2Fconditional-access.%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Econditional%20access%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId-1780194202%22%20id%3D%22toc-hId-1780194202%22%3ECompliance%3C%2FH3%3E%0A%3CP%3E%26nbsp%3BMany%20of%20the%20compliance%20policies%20you%20set%20for%20iOS%20and%20iPadOS%20devices%20using%20Device%20Enrollment%20will%20apply%20to%20User%20Enrolled%20devices%20as%20well.%20However%2C%20there%20are%20a%20subset%20of%20these%20policies%20that%20will%20work%20differently%20on%20User%20Enrolled%20devices.%20The%20biggest%20difference%20between%20Compliance%20policies%20for%20Device%20Enrollment%20and%20User%20Enrollment%20is%20the%20password%20policy.%26nbsp%3B%20User%20Enrollment%20will%20only%20enforce%20a%206-digit%2C%20non-simple%20PIN%20after%20a%20one%20hour%20grace%20period.%26nbsp%3B%20This%20is%20enforced%20at%20the%20OS%20level%20regardless%20of%20what%20is%20configured%20and%20the%20OS%20will%20report%20back%20the%20password%20is%20compliant%20as%20long%20as%20the%20policy%20is%20installed%20on%20the%20device.%20%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThere%20are%20a%20few%20differences%20in%20how%20other%20compliance%20settings%20are%20handled%20as%20well%2C%20detailed%20below.%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EEmail%3A%3C%2FSTRONG%3E%20Managed%20email%20profiles%20will%20work%20for%20User%20Enrolled%20devices%20the%20same%20as%20they%20do%20for%20Device%20Enrollments%20today.%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3EDevice%20Heath%3A%3C%2FSTRONG%3E%20The%20Intune%20Company%20portal%20will%20check%20for%20a%20jailbroken%20device%20regardless%20of%20enrollment%20type.%20Microsoft%20is%20working%20with%20our%20MTD%20partner%20ecosystem%20to%20validate%20scenarios%20r%20reporting%20Device%20Threat%20Level%20on%20User%20Enrolled%20devices.%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3ERestricted%20App%3A%3C%2FSTRONG%3E%20On%20a%20user%20enrolled%20device%2C%20Intune%20only%20receives%20information%20regarding%20applications%20deployed%20to%20the%20device%20in%20the%20managed%20APFS%20volume.%26nbsp%3B%20As%20a%20result%2C%20the%20restricted%20app%20functionality%20is%20not%20valid%20for%20User%20Enrolled%20devices.%3C%2FP%3E%0A%3CP%3E%3CEM%3E%26nbsp%3B%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3EAll%20actions%20for%20noncompliance%20are%20supported.%20These%20include%20sending%20emails%20to%20end%20users%20and%20remotely%20locking%20noncompliant%20devices.%26nbsp%3B%20Conditional%20Access%20policies%20applied%20to%20devices%20targeted%20for%20User%20Enrollment%20are%20the%20best%20way%20to%20ensure%20your%20users%20are%20prompted%20to%20begin%20the%20enrollment%20process%20and%20become%20compliant.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId--771962759%22%20id%3D%22toc-hId--771962759%22%3EConfiguration%3C%2FH3%3E%0A%3CP%3EUser%20Enrollment%20supports%20a%20subset%20of%20available%20device%20configuration%20options%2C%20which%20is%20indicated%20within%20the%20admin%20console%20upon%20creation%20or%20editing%20of%20a%20device%20configuration%20profile.%20If%20a%20pre-existing%20configuration%20profile%20is%20applied%20to%20a%20User%20Enrollment%20device%2C%20only%20settings%20supported%20by%20User%20Enrollment%20will%20be%20applied%20to%20that%20device.%26nbsp%3BMore%20details%20can%20be%20found%20%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FIntune-Customer-Success%2FIntune-support-for-new-settings-and-updates-in-iOS-13-and-macOS%2Fba-p%2F809055%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3Ehere%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId-970847576%22%20id%3D%22toc-hId-970847576%22%3EApp%20Distribution%3C%2FH3%3E%0A%3CP%3EApp%20Distribution%20for%20devices%20with%20User%20Enrollment%20will%20use%20the%20same%20methods%20as%20Device%20Enrollment%2C%20as%20described%20within%20Intune%20documentation.%20All%20applications%20targeted%20to%20users%20that%20are%20supported%20by%20User%20Enrollment%20will%20be%20delivered%20to%20these%20devices%20and%20displayed%20within%20the%20Company%20Portal.%3C%2FP%3E%0A%3CP%3EUser%20Enrollment%20supports%20the%20following%20app%20types%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3ELine-of-business%3C%2FLI%3E%0A%3CLI%3EWeb%20link%3C%2FLI%3E%0A%3CLI%3EVPP%20apps%20with%20User%20licensing%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId--1581309385%22%20id%3D%22toc-hId--1581309385%22%3EAdministrator%20Remote%20Actions%3C%2FH3%3E%0A%3CP%3EYou%20can%20perform%20the%20following%20actions%20on%20User%20Enrolled%20iOS%20devices%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3ERetire%3C%2FLI%3E%0A%3CLI%3EDelete%3C%2FLI%3E%0A%3CLI%3ERemote%20Lock%3C%2FLI%3E%0A%3CLI%3ESync%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3EUser%20Enrollment%20does%20not%20support%20Device%20Wipe%2C%20Passcode%20Reset%2C%20or%20other%20remote%20actions%20not%20listed%20above%2C%20so%20you%20will%20not%20have%20the%20ability%20to%20deploy%20those%20actions%20from%20the%20Azure%20console.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-358014455%22%20id%3D%22toc-hId-358014455%22%3EKnown%20issues%20and%20limitations%20during%20public%20preview%3C%2FH2%3E%0A%3CP%3EFor%20the%20latest%20information%20on%20known%20issues%20and%20platform%20feature%20availability%2C%20see%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fintune%2Fenrollment%2Fios-user-enrollment-supported-actions%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EIntune%20documentation%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--1308865941%22%20id%3D%22toc-hId--1308865941%22%3ENext%20Steps%3C%2FH2%3E%0A%3CP%3EWe%E2%80%99re%20excited%20to%20release%20this%20public%20preview%20to%20our%20Microsoft%20Intune%20customers%20so%20that%20you%20can%20test%20out%20your%20management%20scenarios%20and%20determine%20if%20User%20Enrollment%20is%20a%20correct%20fit%20for%20some%20or%20all%20of%20your%20users%20on%20iOS%20devices.%20As%20we%20continue%20to%20iterate%20on%20User%20Enrollment%2C%20we%20look%20forward%20to%20you%20and%20your%20users%E2%80%99%20usage%20and%20feedback.%20We%20believe%20this%20is%20just%20the%20first%20step%20in%20allowing%20you%20to%20put%20your%20users%20into%20the%20driver%E2%80%99s%20seat%20and%20choose%20what%20type%20of%20enrollment%20makes%20sense%20for%20them.%20Stay%20tuned%20in%20upcoming%20months.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH3%20id%3D%22toc-hId--1363006965%22%20id%3D%22toc-hId--1363006965%22%3EResources%20to%20learn%20more%3C%2FH3%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fintune%2Fenrollment%2Fios-user-enrollment%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EUser%20Enrollment%20with%20Intune%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fintune%2Fenrollment%2Fios-user-enrollment-supported-actions%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3ESupported%20actions%20with%20User%20Enrollment%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fintune-user-help%2Fwhat-info-can-your-company-see-when-you-enroll-your-device-in-intune%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EEnd%20user%20privacy%20with%20Microsoft%20Intune%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAs%20always%2C%20we%20want%20to%20hear%20from%20you!%20If%20you%20have%20any%20suggestions%2C%20questions%2C%20or%20comments%2C%20please%20visit%20us%20on%20our%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2FMicrosoft-Intune%2Fbd-p%2FMicrosoft-Intune%22%20target%3D%22_blank%22%20rel%3D%22noopener%22%3ETech%20Community%20page%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EFollow%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fwww.twitter.com%2Fmsintune%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%40MSIntune%3C%2FA%3E%26nbsp%3Bon%20Twitter%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%3CEM%3E(Authored%20in%20collaboration%20with%20%3C%2FEM%3E%3CA%20href%3D%22https%3A%2F%2Fwww.linkedin.com%2Fin%2Ftiffanysilverstein%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3E%3CEM%3ETiffany%20Silverstein%3C%2FEM%3E%3C%2FA%3E%3CEM%3E%2C%20Product%20Manager%2C%20Microsoft%20Endpoint%20Manager)%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-986301%22%20slang%3D%22en-US%22%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EMicrosoft%20is%20delighted%20to%20announce%20support%20for%20iOS%20User%20Enrollment%20with%20the%20release%20of%20Apple%20iOS%2013.1%20and%20iPadOS.%20This%20feature%20is%20currently%20available%20in%20public%20preview%20with%20Microsoft%20Intune.%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-986301%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EEnterprise%20Mobility%20%2B%20Security%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMicrosoft%20Intune%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EUnified%20Endpoint%20Management%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

 

Microsoft is delighted to announce support for iOS User Enrollment with the release of Apple iOS 13.1 and iPadOS. This feature is currently available in public preview with Microsoft Endpoint Manager, including Microsoft Intune.

 

At Microsoft, we take end user privacy seriously and have long offered the choice of using managed apps or managing the entire device for bring-your-own-device (BYOD) users. Microsoft is delighted to enhance our best-in-class spectrum of BYOD offerings on iOS and iPadOS with User Enrollment. Apple introduced User Enrollment as a new type of lightweight enrollment in iOS 13.1 and iPadOS designed to meet a couple of goals --  namely, how to help IT keep corporate data safe with critical device enrollment features and protect end user privacy on their personal devices. We’re excited to extend Apple’s User Enrollment with the data protection afforded by Intune App Protection Policies to enable IT to use the most crucial device management features while maintaining trust and privacy for end users. Microsoft Endpoint Manager pairs the platform’s lightweight management experience with the intuitive enrollment experience that people love in the Microsoft Company Portal app (thank you for our 4.5 star rating in the App Store!), to create an easy on-boarding experience.

clipboard_image_0.jpeg

 

Every organization is unique, and they generally have end users with a variety of different expectations and use cases. Microsoft supports the full spectrum of device management and data protection choices to support these needs – from managed apps, User Enrollment, and Device Enrollment for personally-owned devices to Automated Device Enrollment for supervised, corporate-owned devices. On personally-owned devices, Microsoft Intune app protection policies provide IT the ability to prevent data leaks from protected apps while leveraging support for multiple identities to provide end users with complete trust that their privacy is protected. We believe our customers can get the best of both worlds when we pair the proven capabilities of Intune app protection policies with the platform capabilities of User Enrollment. Together, the two provide significant granular control over Intune protected apps such as Office 365 and other mobile apps, whether downloaded by end users or provided by IT, paired with the ability to use crucial device management features like a 6-digit non-simple device PIN, required app deployment with VPN to corporate resources on end user devices, and provisioning Wi-Fi access on personal devices.

clipboard_image_1.png

 

Placing the user in control of their enrollment experience

Intune has taken an innovative approach to User Enrollment by putting the user in control of their device enrollment experience. When targeted by their IT admin, the user is asked whether the device belongs to them or their organization. If the device belongs to the user, they are provided with the option of securing the entire device (Device Enrollment) or securing work-related apps and data (User Enrollment). This is a distinct evolution in the enrollment experience which provides end users with the agency to determine the level of control their organization has over their personally-owned devices.

Our user studies have indicated that the ability to determine the level of protection applied to their device is important or very important to end users. 100% of users who participated in our study reported that the Microsoft end user experience for User Enrollment made it clear to them that their company cannot access personal data on their devices.

 

This is a common hesitation among end users, as one respondent put it best: “Every person within the company should only have access to specific information, they shouldn’t have everything. Security (team) is primarily making sure that what you, as an employee, are responsible for is secure within your profile. The enrollment thing is just raising your hand to say, ‘Yes I volunteer to do this’. This (enrollment) is just you validating and choosing what data. “

 

Particularly in today’s environment, users care deeply about their privacy. By enabling end users to choose the type of enrollment that makes sense to them, IT can continue to build trust with users, while maintaining secure control over organizational data. 

 

clipboard_image_2.png

 

 

Enrollment targeting– simple and flexible configuration

You will find the process to get started with User Enrollment is quite simple and provides you with significant flexibility in how you provide choice of enrollment types to your iOS and iPadOS users. First, you will need to ensure you have a valid Apple Push Notification Service (APNS) certificate to manage Apple devices.

 

After that, you will set up managed Apple IDs in Apple Business Manager using federation with your instance of Microsoft Azure Active Directory. Microsoft Azure Active Directory is the only federation partner within Apple Business Manager for all management solutions. The Managed Apple ID provides access to Apple services associated with the organization, separate from the personal Apple ID the user may already use. User Enrollment creates a separate Apple File System (APFS) volume using this ID for managed accounts, apps and data on the device. This managed volume is cryptographically separated from the rest of the device. Managed Apple IDs are created automatically during enrollment when users sign in on a device with their corporate email address. You can find more guidance from Apple on this topic here

 

User Enrollment is designed for securely using personally owned devices for work apps, without giving up management of the entire device to organizations. IT can apply necessary configuration and policies such as requiring a passcode or deploying mandatory apps, but not have the ability to control the camera or access personal information. For company owned devices or particularly sensitive data access on personally owned devices, full device enrollment may still be the preferred management method. Within the Microsoft admin console, you can set up so end users can choose between User enrollment or Device enrollment at the time of enrollment. You can also specify the enrollment type if you wish, or have a mixed approach depending on user groups. Visit the documentation to learn more.

 

Protect corporate data in apps using Intune app protection policies

clipboard_image_3.png

User Enrollment and App Protection Policies are a great example of two management features that are better together for your user‘s personal devices accessing data in your organization. Both management options were designed to protect user privacy, and each solves unique management problems. User Enrollment allows IT to have control over a curated set of device management features. For instance, admins can set policies to enforce a 6 digit non-simplePIN on the device, deploy Wi-Fi profiles, and distribute secured apps such as Microsoft Edge to the device. They can also push configuration for VPN access to on-premises corporate resources. In the past, these specific capabilities drove organizations that were considering App Protection Policies towards heavier-weight Device Management - including features like Device Wipe that end users were not always comfortable with. With the introduction of User Enrollment, admins can pair both management options together to provide a deeper and more robust BYOD solution. App Protection Policies allow users to continue to use the Office apps exactly as they do today and now.  They download the apps directly from the App Store and can use them across all aspects of their lives- whether for work or personal use. At Microsoft, we think it is crucial to enable this dual-use case and App Protection Policies provide your organization the ability to offer this best-in-class experience while also protecting your corporate data against leaks.

 

App Protection Policies target only the corporate account in protected apps, and the data is kept secure and separate from the personal account. In case the device is lost or the user leaves the organization, only the data in corporate account is wiped leaving the personal data in the same app on the personal partition of the device untouched.

 

Considerations for deploying User Enrollment with Microsoft

There are certain recommendations and alternatives that are good to know as you plan the roll-out of User Enrollment within your Microsoft managed device estate.

 

Conditional Access

Conditional Access policies can be applied when users are targeted for User Enrollment and provide the most seamless experience for ensuring users are prompted to begin the enrollment process. These policies can be configured exactly the same way you configure policies for device enrollments today. Turning on Conditional Access will ensure your users are properly forced to enroll in whatever form of management you have defined before they can get access to online resources like Exchange and SharePoint Online. To enable these scenarios, your end users will be prompted to install the Microsoft Authenticator app to their device if it is not already present during User Enrollment. Learn more about conditional access

 

Compliance

 Many of the compliance policies you set for iOS and iPadOS devices using Device Enrollment will apply to User Enrolled devices as well. However, there are a subset of these policies that will work differently on User Enrolled devices. The biggest difference between Compliance policies for Device Enrollment and User Enrollment is the password policy.  User Enrollment will only enforce a 6-digit, non-simple PIN after a one hour grace period.  This is enforced at the OS level regardless of what is configured and the OS will report back the password is compliant as long as the policy is installed on the device.  

There are a few differences in how other compliance settings are handled as well, detailed below.

Email: Managed email profiles will work for User Enrolled devices the same as they do for Device Enrollments today.

Device Heath: The Intune Company portal will check for a jailbroken device regardless of enrollment type. Microsoft is working with our MTD partner ecosystem to validate scenarios r reporting Device Threat Level on User Enrolled devices.

Restricted App: On a user enrolled device, Intune only receives information regarding applications deployed to the device in the managed APFS volume.  As a result, the restricted app functionality is not valid for User Enrolled devices.

 

All actions for noncompliance are supported. These include sending emails to end users and remotely locking noncompliant devices.  Conditional Access policies applied to devices targeted for User Enrollment are the best way to ensure your users are prompted to begin the enrollment process and become compliant.

 

Configuration

User Enrollment supports a subset of available device configuration options, which is indicated within the admin console upon creation or editing of a device configuration profile. If a pre-existing configuration profile is applied to a User Enrollment device, only settings supported by User Enrollment will be applied to that device. More details can be found here

 

App Distribution

App Distribution for devices with User Enrollment will use the same methods as Device Enrollment, as described within Intune documentation. All applications targeted to users that are supported by User Enrollment will be delivered to these devices and displayed within the Company Portal.

User Enrollment supports the following app types:

  • Line-of-business
  • Web link
  • VPP apps with User licensing

 

Administrator Remote Actions

You can perform the following actions on User Enrolled iOS devices:

  • Retire
  • Delete
  • Remote Lock
  • Sync

User Enrollment does not support Device Wipe, Passcode Reset, or other remote actions not listed above, so you will not have the ability to deploy those actions from the Azure console.

 

Known issues and limitations during public preview

For the latest information on known issues and platform feature availability, see Intune documentation

 

Next Steps

We’re excited to release this public preview to our Microsoft Intune customers so that you can test out your management scenarios and determine if User Enrollment is a correct fit for some or all of your users on iOS devices. As we continue to iterate on User Enrollment, we look forward to you and your users’ usage and feedback. We believe this is just the first step in allowing you to put your users into the driver’s seat and choose what type of enrollment makes sense for them. Stay tuned in upcoming months.

 

Resources to learn more

 

User Enrollment with Intune

Supported actions with User Enrollment

End user privacy with Microsoft Intune

 

As always, we want to hear from you! If you have any suggestions, questions, or comments, please visit us on our Tech Community page.

 

Follow @MSIntune on Twitter

 

 

(Authored in collaboration with Tiffany Silverstein, Product Manager, Microsoft Endpoint Manager)