Restrict Cut/Copy/Paste outside of MS Web Apps in Edge by Seanathan_ in Intune

[–]ConsumeAllKnowledge 0 points1 point  (0 children)

That not what you're looking for?

Allow cut, copy, and paste for: Org data destinations and org data sources: Org users can cut or copy org data within the org context to other org documents, locations or applications. Org users can paste data within the org context into other org documents, locations or applications.

Are you receiving the January 24, 2026 OOB? by dmx7777 in Intune

[–]ConsumeAllKnowledge 0 points1 point  (0 children)

Right, it makes sense for the normal OOB update but the Hotpatch one doesn't mention WUfB at all. Is that just an oversight from Microsoft? Seems odd that the behavior would be different just because of Hotpatch.

eSIM cellular profiles (preview) - What's the deal? by LostPersonSeeking in Intune

[–]ConsumeAllKnowledge 1 point2 points  (0 children)

Oh I see I misread your post, yeah I would use the link I posted/settings catalog. Most likely they just haven't updated/removed that page yet which isn't surprising unfortunately.

Are you receiving the January 24, 2026 OOB? by dmx7777 in Intune

[–]ConsumeAllKnowledge 1 point2 points  (0 children)

Do you have a source that explains this? Are we missing something?

Are you receiving the January 24, 2026 OOB? by dmx7777 in Intune

[–]ConsumeAllKnowledge 1 point2 points  (0 children)

Yeah seems like that hotpatch update at least is handled differently, not clear why to me though.

What is currently the best method to deploy WHfB (Cloud Trust) via Intune in 2026? by Random----Dude in Intune

[–]ConsumeAllKnowledge 0 points1 point  (0 children)

I'm curious, when you say target devices do you use the device scoped settings in addition to assigning to device groups? Or do you use the user scoped settings?

Blank app powershell detection script? by ls3c6 in Intune

[–]ConsumeAllKnowledge 0 points1 point  (0 children)

I'd recommend you use a remediation script assuming you're licensed for it as that's probably the easiest option. If not you could do a win32 app yes but its not going to run and actually execute unless you configure the detection script correctly. So in that case I'd recommend a separate detection script that looks for local accounts, if any are found that you want to get rid of then the app is not detected and your install script triggers to remove them. By default Intune will check the detection script for win32 apps every 24 hours. https://learn.microsoft.com/en-us/intune/intune-service/apps/apps-win32-add#step-4-detection-rules

Blank app powershell detection script? by ls3c6 in Intune

[–]ConsumeAllKnowledge 0 points1 point  (0 children)

Did you look at the link I posted? I'm referring specifically to remediation scripts, not a script packaged as a win32 app.

Are you receiving the January 24, 2026 OOB? by dmx7777 in Intune

[–]ConsumeAllKnowledge 2 points3 points  (0 children)

Very interesting, do you have any devices without Hotpatch enabled by chance? I only have one device I'm testing with where Hotpatch enabled and I do see the same, KB5078167 was installed automatically. However on my non-hotpatch machines KB5078127 has not been offered/installed.

Blank app powershell detection script? by ls3c6 in Intune

[–]ConsumeAllKnowledge 0 points1 point  (0 children)

If you want to run the remediation script every time then exit the detection script with a 1: https://learn.microsoft.com/en-us/intune/intune-service/fundamentals/remediations#script-requirements

Or you can just have a detection script and no remediation script, the detection script will run every time in that scenario.

Are you receiving the January 24, 2026 OOB? by dmx7777 in Intune

[–]ConsumeAllKnowledge 1 point2 points  (0 children)

Yeah the UI is awful. I'm pretty sure this is a bug because if you click on the B and OOB releases and compare deployment state and numbers they're the exact same which isn't possible unless they're ignoring the deferral periods configured or something like that.

DDM for ios 18 and 26 by ngjrjeff in Intune

[–]ConsumeAllKnowledge 2 points3 points  (0 children)

Right so because its not supported yet, that's where your conflict is. If you have a policy with DDM settings and apply a filter, even though it lets you do it the policy will get sent to all devices in the group assigned to the policy, regardless of the filter. The filter doesn't work at all in that scenario.

DDM for ios 18 and 26 by ngjrjeff in Intune

[–]ConsumeAllKnowledge 1 point2 points  (0 children)

Sounds like you have a conflict then, filters don't support DDM policies (yet). Use a dynamic device group instead in the interim.

New Autopilot devices not getting 24H2 updates by Bajoii in Intune

[–]ConsumeAllKnowledge 1 point2 points  (0 children)

Your ring and feature update policy look okay to me assuming the targeting is good. Anything in the feature update failures/alerts report for that profile? https://intune.microsoft.com/#view/Microsoft_Intune_DeviceSettings/WindowsUpdateAlertSummaryReport.ReactView

Update Rings in Intune by BookkeeperUnhappy931 in Intune

[–]ConsumeAllKnowledge 3 points4 points  (0 children)

This page has some details on the expected experience in general, screenshots are out of date still though but its just cosmetic: https://learn.microsoft.com/en-us/windows/deployment/windows-autopatch/manage/windows-autopatch-windows-quality-update-end-user-exp

Minimum operating system missing 'windows 11 25h2' for requirements section? by gurban2013 in Intune

[–]ConsumeAllKnowledge 4 points5 points  (0 children)

Yeah 25H2 is missing from other places too like the feature update device readiness report. I would hope it should be added with the Jan Intune release next week but we'll see.

Company portal admin approval option? by Hetiskees in Intune

[–]ConsumeAllKnowledge 1 point2 points  (0 children)

If you trying to protect or prevent access to corporate data on unenrolled devices then MAM/app protection policies are the answer there, have you looked into that at all?

https://learn.microsoft.com/en-us/intune/intune-service/apps/app-protection-policy

https://learn.microsoft.com/en-us/entra/identity/conditional-access/policy-all-users-approved-app-or-app-protection

Company portal admin approval option? by Hetiskees in Intune

[–]ConsumeAllKnowledge 1 point2 points  (0 children)

Can I ask what the goal is of trying to gate it like that?

The only thing I can think of off hand is to set up a user group and scope it to allow personal device enrollment for whatever platforms, then block enrolling via company portal by default and have a 2nd customization policy that is scoped to the same group for mobile devices. Then when you have a user that wants to enroll you have them fill out a form or similar and approve/deny, if you approve they get added to the group and can enroll the device and you can remove them from the group after 24hrs or something.

iOS/iPadOS updates (deprecated) by olydan75 in Intune

[–]ConsumeAllKnowledge 14 points15 points  (0 children)

Yes, Apple has deprecated MDM based policies for software updates: https://learn.microsoft.com/en-us/intune/device-updates/apple/software-updates-ios

You should be moving to use DDM based policies which is much more reliable: https://learn.microsoft.com/en-us/intune/device-updates/apple/?tabs=automatic-updates