Android
606 Topics365 App Sign in & Edit Issues
Hello, I am attempting to edit a word document saved on OneDrive. I have the 365 app. The document opens and states I cannot edit unless I sign in. When clicking to sign it, it then states it cannot put my personal email (which is what the subscription is under) I need to put a work or school email and if it doesn't work then to contact said work or school. However, my subscription is my personal email and I am logged into the app with my personal email. I'm confused and need support please! Exact wording opening document: "This account does not allow editing on your device. For an account with full access, contact your organizational out your subscription plan" **For reference: I have frequently used my android phone for editing documents Exact wording when signing in: "We couldn't find a work or school account with that email address"25Views0likes1CommentHow are new and emerging technologies shaping the future of mobile experiences?
I’ve been thinking a lot about how new technologies are changing mobile experiences these days. Like, we’ve got AI, AR, super-fast internet like 5G, and even foldable phones now. It all sounds cool, but I don’t fully understand how this stuff is actually making a difference or what kind of things we’ll be able to do with our phones in the future. For example, I heard about apps getting smarter with AI, but does it really make life easier or is it just a trend? Also, are these technologies actually worth spending money on, or is it better to wait until they’re more common? I’d love to know if anyone has thoughts or has used anything like this. It’d be super helpful if you guys could share your experiences or explain how these technologies are shaping mobile stuff.14Views0likes0CommentsIntune - Multi-App Kiosk Mode Android - Managed Home Screen - Can't return to Call Screen
Hi there, Here is the issue: In Multi-App Kiosk Mode for Android A user makes or receives a phone call that is long enough to trigger lock screen Call can continue indefinitely despite no longer seeing the Telephony UI Time to hang up, enter your passcode, you are taken to Managed Home Screen From here you can't access the Telephony UI and hence you can't hang up! The call interface Telephony UI is not an App on its own that you can Add to the Home Screen Any ideas welcome. Ta, Ian Hearnes13Views0likes0CommentsIntune Android PKCS {{OnPrem_Distinguished_Name}}
I've already make a Ticket January 2024 to Microsoft Support, the Issue is known but not in priority to fix it. If i build a pkcs profil for Android and will set a placeholder for AN CN={{OnPrem_Distinguished_Name}} the result in Certificates are CN="CN=XXXX,OU=XXXX,DC=XXXX". I mean the dubblequots are false implement in programming. If i use the same Placeholder on a iOS PKCS Profil the Certificate are korrekt issued CN=XXXX,OU=XXXX,DC=XXXX73Views0likes0CommentsIntune ending support for custom profiles for personally owned work profile devices in April 2025
Years ago, before Microsoft Intune provided the many Android settings available today, Microsoft Intune introduced custom configuration profiles for Android Enterprise personally owned work profile devices. Custom profiles allow admins to configure settings that weren’t built into the Microsoft Intune admin center, leveraging Open Mobile Alliance Uniform Resource Identifier (OMA-URI) settings used by device manufacturers. Today, admins can configure all of the settings available in custom policies for personally owned work profile devices through other policy types in the Microsoft Intune admin center. The one exception is configuration of Basic Wi-Fi profiles with a pre-shared key, which will be supported in Wi-Fi configuration profiles in the first quarter of calendar year 2025. Because custom profiles are harder to configure, troubleshoot, and monitor, and offer no additional benefits now that equivalent settings are available in the Microsoft Intune admin center, we’re ending support for custom profiles for Android Enterprise personally owned work profile devices on April 1, 2025. Note: This change only applies to custom profiles for Android Enterprise personally owned work profile devices and doesn’t impact custom profiles for Android device administrator devices. How does this affect you or your users? After Intune ends support for custom profiles for personally owned work profile devices in April 2025: Admins won’t be able to create new custom profiles for personally owned work profile devices. However, admins can still view and edit previously created custom profiles. Android Enterprise personally-owned work profile devices that currently have a custom profile assigned will not experience any immediate change of functionality. Because these profiles are no longer supported, the functionality set by these profiles may change in the future. Intune technical support will no longer support custom profiles for personally owned work profile devices. How to prepare for this change To prepare for this change, follow these steps to check if you have custom profiles for personally owned work profile devices and learn how to set up alternate policy types: Navigate to the Microsoft Intune admin center. Identify the custom policies in use in your tenant: Select Devices > Android > Configuration. Filter the Platform column by Android Enterprise to get a list of Android Enterprise policies. Sort the Policy type column and look for all the policies with policy type listed as Custom. (If none are found, then no action is needed.) Create policies with equivalent settings. See tables below for settings mapping. Assign the new policies to the same groups that had been assigned the custom profiles. Unassign all groups from the custom profiles. Test and confirm device behavior is unchanged, that the new profile settings fully replace functionality from the old custom profiles. Delete the custom profiles. Replacements for custom settings Below is a mapping from custom settings to the alternate settings that you should use instead. Work profile settings Custom setting Equivalent setting ./Device/Vendor/MSFT/Container/ DisableRedactedNotifications Create a device restrictions policy > Work profile settings > General Settings > set Work profile notifications while device is locked to Block ./Device/Vendor/MSFT/WorkProfile/ CustomGmsWorkProfileDomainAllowList Create a device restrictions policy > Work profile settings > General Settings > Add and remove accounts, set to Allow all accounts types and configure Google domain allow-list ./Device/Vendor/MSFT/WorkProfile/ WorkProfileAllowWidgets Create a device restrictions policy > Work profile settings > General Settings > Allow widgets from work profile apps ./Microsoft/MSFT/WorkProfile/ DisallowCrossProfileCopyPaste Create a device restrictions policy > Work profile settings > General Settings > Copy and paste between work and personal profiles ./Vendor/MSFT/Policy/Config/DeviceLock/ MaxInactivityTimeDeviceLock Create a device restrictions policy > Password > Maximum minutes of inactivity until work profile locks ./Vendor/MSFT/WorkProfile/ DisallowModifyAccounts Create a device restrictions policy > Work profile settings > General Settings > set Add and remove accounts to Block all account types. ./Vendor/MSFT/WorkProfile/Applications/<package>/ PermissionActions Create an app configuration policy for Managed devices > Permissions > Add ./Device/Vendor/MSFT/WorkProfile/ WorkProfileEnableSystemApplications Follow the steps to Manage system apps Wi-Fi settings Custom setting Equivalent setting ./Vendor/MSFT/WiFi/Profile/<SSID>/Settings Create a Wi-Fi policy with your chosen Wi-Fi configurations for personally owned work profile devices. Here you will also be able to configure Wi-Fi with a preshared key when it becomes available. ./Vendor/MSFT/WiFi/<SSID>/Settings ./Vendor/MSFT/DefenderATP/Vpn Create an app configuration policy for managed devices and set Targeted app to Microsoft Defender: Antivirus and then configure VPN VPN settings Custom setting Equivalent setting ./Vendor/MSFT/VPN/Profile/<vpn name>/PackageList Create VPN profiles with your chosen VPN configuration for personally owned work profile devices ./Vendor/MSFT/VPN/Profile/<vpn name>/Mode ./Vendor/MSFT/DefenderATP/AntiPhishing Create an app configuration policy for managed devices and set Targeted app to Microsoft Defender: Antivirus and then configure Anti-Phishing. ./Vendor/MSFT/DefenderATP/DefenderExcludeAppInReport Create an app configuration policy for managed devices and set Targeted app to Microsoft Defender: Antivirus and then configure Hide app details in report and Hide app details in report for personal profile. ./Vendor/MSFT/DefenderATP/DefenderTVMPrivacyMode Create an app configuration policy for managed devices and set Targeted app to Microsoft Defender: Antivirus and then configure Enable TVM Privacy and Enable TVM Privacy for personal profile ./Vendor/MSFT/DefenderATP/Vpn Create an app configuration policy for managed devices and set Targeted app to Microsoft Defender: Antivirus and then configure VPN Stay tuned to this blog for updates! If you have any questions or feedback on this change, leave a comment on this post or reach out on X @IntuneSuppteam. Post updates 12/10/24: Minor formatting fixes.3.3KViews3likes1Comment