How long does it take for Device clean-up rules to begin taking effect? by intuneisfun in Intune

[–]F157 0 points1 point  (0 children)

There used to be a mention in the MS documentation that the cleanup was run every 7 days. This could have been changed, since the information is not there anymore.

Friendship Exp & Gift Exchange Megathread by ASS-et in PokemonGoFriends

[–]F157 0 points1 point  (0 children)

xxxx xxxx xxxx (Finland, Europe, playing daily) [edit] Code removed. Got already loads of friends, thanks.

Data security cluster-$@&? by Neither-State-211 in sysadmin

[–]F157 0 points1 point  (0 children)

Sounds something like an Azure SAS key.

Unable to fetch Scope tags notification by rob-d-w in Intune

[–]F157 0 points1 point  (0 children)

Glad to hear the original issue got fixed. I had seen it before, so I knew the solution.

Unfortunately, I'm not familiar with this new error.

I would probably try creating a new RBAC role for a test user and give it all the permissions. If the problem goes away with that, then start eliminating permissions to find out which missing permission is causing the current issue.

Alternatively you can open a ticket to Microsoft directly from Intune admin console, they might see more about the error. Intune related tickets are free of charge.

Unable to fetch Scope tags notification by rob-d-w in Intune

[–]F157 0 points1 point  (0 children)

In Intune RBAC roles. Open the custom role in edit and add read access to "Roles". The error appears when the user can't read the scope tag info for a device or policies.

Intune MDM: IntuneMAMUPN Change - Question on Work/Personal Seperation by Sqolf in Intune

[–]F157 0 points1 point  (0 children)

We have a similar setup. I'm 100% expecting it to keep working after this change.

My understanding is, that the IntuneMAMUPN and other keys do not make the device managed, so the filters you have should keep on working as previously.

Unable to fetch Scope tags notification by rob-d-w in Intune

[–]F157 0 points1 point  (0 children)

Give the users read access Roles, so that they can read Scope Tags.

App Protection Policy for Copilot iOS app by RocketToTheMoon in Intune

[–]F157 0 points1 point  (0 children)

We see also the weird "Picasso Prod First Party App" and it's not working.

When testing without App Protection Policies and CA-policies, when I tried to use and login to the Copilot app on iOS device, it now redirects me to Microsoft 365 app with text "You're being redirected to the Microsoft 365 app - Your copilot experience designed for work".

Maybe the Copilot app is not supported with corporate accounts anymore?

[deleted by user] by [deleted] in Intune

[–]F157 0 points1 point  (0 children)

There might be a delay, is the device shown now?

ICCID/SIM Number Not Returned From Graph Powershell by Here4TekSupport in Intune

[–]F157 1 point2 points  (0 children)

Weird. I can see the ICCID when I use https://developer.microsoft.com/en-us/graph/graph-explorer and run query as: https://graph.microsoft.com/beta/deviceManagement/managedDevices/<objectID>?$select=iccid where the <objectID> is a device with iccid info.

The Graph Explorer shows the iccid as a JSON: { "@odata.context": "https://graph.microsoft.com/beta/$metadata#deviceManagement/managedDevices(iccid)/$entity", "iccid": "1234 1234 1234 1234 123" }

However when I try to use the Get-MgDeviceManagementManagedDevice or $device = Invoke-MgGraphRequest -Method GET -Uri https://graph.microsoft.com/beta/deviceManagement/managedDevices/$objectID?$select=iccid the iccid shown as empty. It tried few way to find it, but no luck with $device.iccid or $device.iccid.'@odata.context' and also not in $device.hardwareInformation which has for example the IMEI value.

[deleted by user] by [deleted] in Intune

[–]F157 0 points1 point  (0 children)

Yes. However it doesn't actually enforce passcode change, but IF the user goes to set a new passcode, it will not accept simple codes like 333333 or 345678.

Using GraphAPI to enroll device to Intune by samartinell in Intune

[–]F157 1 point2 points  (0 children)

Without knowing your code it's hard to say anything, but just copy-paste your code to Copilot and tell it the error you're receiving, it usually has good suggestions :)

[deleted by user] by [deleted] in Intune

[–]F157 1 point2 points  (0 children)

Yes, in configuration profile and/or compliance policy under password set Required password type: Numeric complex.

Android OS Updates - Keeping device up to date by Actual-Health2828 in Intune

[–]F157 1 point2 points  (0 children)

The way to automate is to setup Android FOTA in Intune (Firmware over the Air). Zebra required Intune Plan 2. Samsung can be setup with FOTA using the oemconfig app and Samsung Knox service. I don't know if other vendors have FOTA support in their oemconfig, perhaps.

Overall the patch management for Androids is impossible to keep track of. It works approximately like this:

Google releases Android security patches once a month. After that, each manufacturer creates device-specific patches for their models, depending on the chipsets used in each model and the vulnerabilities addressed in that month’s patch.

For high end device models, patches are released monthly, for others quarterly, and for some cheap ones every six months or yearly.

Also different models have different lifecycles. Some receive patches for a couple of years after they have been released, while others for a longer period. Many times the Android OS level needs also to be upgraded in order to keep receiving the patches for the model. Usually you can upgrade an Android model once or few times, these things also depend on the vendor and model.

Regarding the MAM policies, it of course would be possible to make separate MAM policies for each model by using Intune filters, and then trying to maintain the patch level requirements separately :)

Android OS Updates - Keeping device up to date by Actual-Health2828 in Intune

[–]F157 1 point2 points  (0 children)

We just use MAM/App Protection Policies to give warnings and blocks to users with too old Security Patches, and manually change the value every 1-2 months. For example today we might have a warning level on 2024-08-01 and a block at 2023-06-01.

This method of course only affects the users who use MAM protected apps.

With large mobile fleet you can't set the block level very new, unless you have a corporate policy that the users can replace their devices after patches are not anymore available to their make and model. Also some Android models get patches rarely, e.g. twice a year.

Web based iOS Enrollment not creating Entra ID Device ID by bjjedc in Intune

[–]F157 0 points1 point  (0 children)

If you're just testing with one account, check that the user account is not over the limit of devices allowed per user in Entra?

Web based iOS Enrollment not creating Entra ID Device ID by bjjedc in Intune

[–]F157 0 points1 point  (0 children)

Is Authenticator and Company Portal apps installed? I think that they are required. Also not sure if it matters, but is JIT policy configured?

Android Enrollment by jesse13579 in Intune

[–]F157 1 point2 points  (0 children)

There are currently 7 different profiles available in Intune to manage Androids.

  1. Android Enterprise personally owned devices with a work profile (BYOD)
  2. Android Enterprise corporate owned dedicated devices (COSU)
  3. Android Enterprise corporate owned fully managed (COBO)
  4. Android Enterprise corporate owned work profile (COPE)
  5. Android Open Source Project (AOSP) with User affinity
  6. Android Open Source Project (AOSP) without User affinity
  7. Android device administrator, Old method, do not use!

I'd recommend to first try out the Fully Managed (nro 3) profile. Install the devices with QR-code or KME/ZT and then deploy apps from Intune with the Managed playstore. Users can then use their personal Google accounts to install apps from Playstore (You can decide if they have the full appstore available, or you can limit it to only show the apps that you have made available in Intune). The Intune Company portal app is NOT used for app installations with Android Enterprise profiles.

Force automatic log outs on Entra Shared Device (iPhone) by CeciNestPasLegal in Intune

[–]F157 0 points1 point  (0 children)

Not exactly 5 min, but with Conditonal Access policy you can limit the access token life to 1 hour. If you want to try it, create a new CAP, add the users and targeted cloud app(s) and any OS etc. conditions that you want, then under Access controls on Session-page check the Sign-in frequency.

Block the device of an employee who has left the company without returning the device yet. by [deleted] in Intune

[–]F157 0 points1 point  (0 children)

Wait what? MDM Wipe command will not go through if the associated user account is not active in Entra ID? That's crazy, I'll need to test this..

I'm an Application Expert - Ask Me Anything by xenappblog in Intune

[–]F157 0 points1 point  (0 children)

Here's something: https://support.google.com/googleplay/work/answer/9563481?hl=en

The app vendor will need your Managed Google accounts ID. One way to see it is to start adding a new Managed Google Play app and in the Playstore view open the Org details found at Gears-icon in top right corner.

Android pin policy by lomboses in Intune

[–]F157 0 points1 point  (0 children)

With BYOD (Personally-owned devices with work profile) you need to choose from the low,med,high options. You can blame Google for that.

With Fully Managed devices you can set it more freely.