MEM
17 TopicsIntune 403 error - When accessing InTune Portal
Hi Intune Community, I have two users who I have given them the Application Manager role with full access, under Tenant Admin --> MEM roles but they are receiving following access error when they try to reach Intune/Endpoint Manager: I read https://techcommunity.microsoft.com/t5/microsoft-intune/401-and-403-error-when-logging-into-endpoint-admin-center/m-p/1713817#M5226 link, which does not apply to our environment. As we already have the MDM set-up and running. Any thoughts/help appreciated.Solved64KViews0likes8CommentsIntune marks Not Compliant if device does not sign in regularly, then permanently blocks the device
I'm using Intune's Conditional Access to block non-compliant devices on my O365 tenant. A problem I'm encountering is that the "Built-in Device Compliance Policy" turns Not Compliant if the device fails to log in for a long period of time. When this happens, the device gets blocked for being Not Compliant, so is unable to refresh the Built-in Device Compliance Policy that would make it compliant again. The only solution I've found is to stop enforcing CA on the user until the device is able to sign in successfully again. Then I can resume CA. This is obviously not an ideal solution. Am I the only one dealing with this?Solved32KViews0likes32CommentsBest practice for the managed Google Play Account in Intune/MEM
Hi All, I'm looking for some advice on the best practice for setting the first step of Android enrollment in Microsoft Intune/MEM. What is the best practice for security and management, when we choose the managed Google Play account for Intune/MEM ? Using an AzureAD account (with or without exchange online licence), a Google account, or other external account ? Does this account need to have access to a mailbox and MFA can be used with this account ? Thanks !Solved12KViews0likes10CommentsSOLVED: No notifications from Teams on iOS (version 4.1.0 on iOS 15.3 with MAM)
Update: Fixed! Issue: No notifications from Teams on iOS. Root cause: A recent update to notification services contained a code regression that caused impact to users with the Microsoft Intune 'Block Org Data' setting enabled. MAM (Protection): Is set to "Org data notifications -> Block org Data" App version: 4.1.0 (100772022013102) latest from App Store (Jan 29, 2022) Intune SDK version: 15.1.3 BundleID: com.microsoft.skype.teams Tested iOS version: iOS 15.4 & iOS 15.3 App version (last known working ): 3.22 (100772021224302) (Jan 18, 2022) Intune SDK version: unknown BundleID: com.microsoft.skype.teams.extshare Tested iOS version: iOS 15.3 Notes: Confirmed that after Teams app update the notifications no longer work. Further testing: App reinstall did not have any impact Device restart did not have any impact Re-authentication did not have any impact Notifications are enabled in Settings > Notifications > _ Teams > all default enabled Tested device was not on silent nor was Do Not Disturbed active Teams Notifications settings were enabled and the in-app notifications worked Speculation: It seems that the latest version of Teams on iOS has broken something with Notifications, the MAM policies have not changed during this period and the 3.22 version was still able to operate as expected. I am not a developer but there may be something that changed in the Notification Policy implementation? // IntuneMAMNotificationPolicyAllow - All notifications for the managed user should be allowed // IntuneMAMNotificationPolicyBlockOrgData - Only static notifications without specific details // should be shown for the managed user e.g. "You've got mail" or "You have a meeting". // IntuneMAMNotificationPolicyBlock - All notifications for the managed user should be suppressed. typedef NS_ENUM(NSInteger, IntuneMAMNotificationPolicy) { IntuneMAMNotificationPolicyAllow = 0, IntuneMAMNotificationPolicyBlockOrgData = 1, IntuneMAMNotificationPolicyBlock = 2, }; Workarounds: Disabling the MAM Application Protection policy Notification component, but other than that no other workarounds as far as I know.Solved7.9KViews0likes4CommentsHow to remove MDE managed devices in MEM?
Hi, I had two windows server VMs with MDE(Microsoft Defender for Endpoint) onboarded. For test purpose, I turned on the security settings management in MDE to let MEM deploy some security policies to them. It worked fine. I got corresponding device entries in AAD and MEM and was able to manage the VMs like other Intune managed devices. After I deleted the VMs, I found the device entries are somehow lingering. For MDE, I knew there is a data retention time which is 30 days in my case. I waited for a month and the VMs do disappear from MDE. But I can still see them in AAD and MEM till now. I can't do anything to them in MEM, while I can temporarily delete them in AAD and see them respawn next day. According to the doc, there is a way to solve this problem, but I can't see how. Use Intune to manage Microsoft Defender for Endpoint Security on devices not enrolled with Microsoft Intune | Microsoft Learn Does anyone know what "be removed from the scope of Configuration Management in the Security Center" means and how to perform it? Thanks for reading this post.Solved7.4KViews0likes2CommentsiOS DEP enrolled devices missing Enrollment Profile (breaking dynamic group and filter logic)
Starting 31/05/2022 new iOS enrollments via Apple Business Manager Device Enrollment do not have an Enrollment Profile attribute assigned under Hardware, generally we use this attribute to define dynamic groups/filters. I have seen this on at least two different customer tenants so far. Example of a filter no longer matching a device enrollment. (previous enrollments still show the correct Enrollment Profile Note: Testing 3 tenants we only see two in APAC impacted so far. Asia Pacific 0101 Asia Pacific 02013.2KViews0likes6CommentsUniversal Print Intune error - Install (User) -2147418113 & -2138701812
I'm currently doing a PoC on Universal Print using connector installed on an on-premise server 2022. I successfully installed the printers on the Connector server, registered with Azure UP (Universal Printer), shared it and began configuring Intune (MEM) to deploy on Win 10 machines. I used printer provisioning from the configuration profile catalog and put all the required values. I targeted the profile on a group of users. The results were interesting. Two users installed the UP with no errors, 3 other users failed to install with error message details below. I could not find any of these errors documented any where. I have engaged MS Support and waiting on solution. These errors are not documented anywhere for MEM. Here are the errors in anyone might be able to help Install (User) -2147418113 Install (User) -2138701812 I have also attached screenshot from MEM2.9KViews0likes2CommentsEnablement Packages through MEM
I just spent the last 6 weeks getting a majority of user's systems up to Windows 10 20H2. They are all hybrid joined to AAD and are enrolled in MEM(Intune). I used the Windows 10 feature update Policy to update a majority of them from 1809 and 1909. My question is if I change the policy property in my Windows 10 Feature policy, will an enablement package be offered to my users or will they have to go through the same upgrade process it took to get them to 20H2 from 1809/1909? If they have to go through the upgrade process, would deploying an enablement package through Intune be a good option or is there a better option (MECM with a CMG)? My end goal is to keep releasing enablement packages to my users to avoid the disruption of the upgrade process to my users every year or so.2.6KViews0likes2Comments