Did you know: there will be a change in experience when enrolling Android Enterprise dedicated devices in Intune

Did you know: there will be a change in experience when enrolling Android Enterprise dedicated devices in Intune. This is in addition to MC193745 that with the November release Microsoft were adding support for SCEP certificate deployment to Android Enterprise dedicated devices, to enable certificate-based access to Wi-Fi profiles. This change involved some minor enrollment flow changes for Android Enterprise dedicated devices.

How does this affect me?

If you manage Android Enterprise dedicated devices in your environment, you will start to see some changes roll out in March.

– For existing Android dedicated devices enrolled prior to the November 22, 2019 or the 1911 service update: These devices have the Microsoft Intune app installed on them. After backend changes roll out in the Intune service in March, SCEP certificates deployed to devices and associated with Wi-Fi profiles will start to apply.

– For devices that were enrolled after November 22, 2019 and before this change rolls out in March: These devices have the Microsoft Intune app installed on them. SCEP certificates deployed to devices and associated with Wi-Fi profiles will continue to apply.

– For new Android Enterprise dedicated device enrollments after the change rolls out in March: End users will see a different set of steps on devices during enrollment. Enrollment will still start the way it does today (with QR, NFC, Zero-touch, or device identifier) but there will be no mandatory app install step. Instead, the Microsoft Intune app will automatically install on devices. Additionally, end users will not need to tap “Enable Intune Agent” during the flow. SCEP Certificates associated with WiFi profiles can be deployed to these devices.

Share:

Facebook
Twitter
LinkedIn

Contact Us

=
On Key

More Posts

WME Security Briefing 27 May 2024

Kinsing Hacker Group Exploits Docker Vulnerabilities Overview Recent investigations have shown that the hacker group Kinsing is actively exploiting Docker vulnerabilities to gain unauthorized access to systems. The modified hacker group targets misconfigured Docker API ports deployed with cryptocurrency mining malware.

Read More »
WME Cybersecurity Briefings No. 010
Cyber Security

WME Security Briefing 20 May 2024

Advanced Persistent Threats: North Korean Hackers Launch Golang Malware Overview A new malware strain, called Titan Stealer, is currently actively circulating in the threat landscape, targeting a variety of personal data and linked to North Korean state-sponsored cyber espionage

Read More »
WME Cybersecurity Briefings No. 009
Cyber Security

WME Security Briefing 08 May 2024

Exploitable vulnerability in Microsoft Internet Explorer, used to deploy VBA Malware Overview Cybersecurity researchers discovered a severe exploitation targeting a bug that had already been patched in the Microsoft Internet Explorer browser. Their report added that

Read More »
Be assured of everything

Get WME Services

Stay ahead of the competition with our Professional IT offerings.

=