Device Configuration
4 TopicsiOS 18.2 Configuration - App Store (settings) disappears in iOS settings
Hello, in our compandy we deploy our iOS devices using a device restrictions configuration in Intune. We have app store blocked, but until iOS 18.2 , the option of the settings for the app store was still available in the iOS settings. Now the app store disappers (on a private iPhone the app store moved under Apps). Unfortunately we need this option to configure the automatic downloads option via mobile network (and not asked for Apps over 200MB). Are there changes we can make that block the app store, yet still allow automatic updates over cellular data for managed apps? Thank you.62Views0likes0CommentsIssue Setting Powershell Execution Policy in Settings Catalog (Error 65000)
Hi there, I am experiencing issues with Enabling PowerShell Script execution with RemoteSigned Scripts on LocalMachine and user level. I am using a Service Catalog Policy enabling Script Execution. I tried both user and device scope. With devices that do not have the latest cumulative updates the setting is not applicable after syncing. All Machines have 20H2 Enterprise installed by policy with latest security patches. On a updated machine (still with 20H2) the policy throws an error 65000 in the EPM portal. The event log shows the following error: I also tried other possibilities like setting up proactive remediations to set the PowerShell execution policy but that isn't working either.2.3KViews0likes0CommentsSecurity Baselines instead of standalone configs?
Hi everyone, i'm aksing myself why security baselines are useful? At this moment i use device configurations for ATP, Hello, Device restrictions etc.. Why should i use security baselines instead? What are the advantages for me? Thank you in advance. 🙂 PatrickSolved1.7KViews0likes3CommentsDevices not connecting to WPA2 Enterprise (EAP-TLS) wireless network automatically
I'm currently using Intune to push a wireless profile to iOS devices and encountering issues connecting automatically to the wireless network in question. Here is the scenario: Device types: iPhones & iPads OS version: 12.1 Authentication method: EAP-TLS Client Certificate: Device certificate via SCEP Client certificate type: Device cert In my case, the root CA cert is being delivered to the devices. The client certificate is successfully being requested by the device using SCEP. The Wi-Fi profile is also being pushed out to the device successfully. I've even tried pushing out the intermediate CA that issues the certificates for the authentication server and client devices as a trusted certificate. When users attempt to connect to the wireless network, they are prompted for credentials. They then have to select the client certificate and the encryption type before connecting to the network. Once users select the certificate, they connect successfully. What I would like is for this step to be avoided to improve the user experience and to eliminate the likelihood of users selecting the wrong certificate. Is this even possible or will the user always be required to select the cert? I've been told it is. It's not even a case where the certificate being presented by the authentication server is not trusted. The device though seems unable to identify which certificate to present to the authentication server for authentication.Solved17KViews0likes9Comments