Block Auto Update After Tuning Off Android
- Android Turn Off App Updates
- Block Auto Update After Tuning Off Android App
- Block Auto Update After Tuning Off Android Phone
- Block Auto Update After Turning Off Android Computer
- Block Auto Update After Turning Off Android App
Jul 10, 2017 To turn off automatic updates in version 5.0 of the Play Store, open the Play Store and touch the menu icon in the upper-left corner of the screen. Scroll down and Touch “Settings” on the menu. If your apps have been updating automatically, the “Auto-update apps” setting in the “General” section on the “Settings” screen will read “Auto-update apps at any time.
- Jan 12, 2019 1. Open the Google Play Store app and tap on the 3-bar menu icon on the top left. In the Play Store settings, tap Auto-update apps. You'll see three options (which can be changed at any time): Do not auto-update apps. Choose the bottom one. Note that this means you will always need.
- Jan 12, 2019 1. Open the Google Play Store app and tap on the 3-bar menu icon on the top left. In the Play Store settings, tap Auto-update apps. You'll see three options (which can be changed at any time): Do not auto-update apps. Choose the bottom one. Note that this means you will always need.
- In Android 5.0 you can turn off auto updating. Open the Google Play Store. Swipe in from the left side of the screen or tap the button in the upper left to open up the Play Store menu. MORE: Android 5 Lollipop: A Guide to the Best New Features. Select Settings.
This article lists and describes the different settings you can control on Android Enterprise devices. As part of your mobile device management (MDM) solution, use these settings to allow or disable features, run apps on dedicated devices, control security, and more.
Before you begin
Create a device configuration profile.
Device owner only
Android Turn Off App Updates
These settings apply to Android Enterprise enrollment types where Intune controls the entire device, such as Android Enterprise Fully Managed or Dedicated devices.
General
Block Auto Update After Tuning Off Android App
Screen capture: Block prevents screenshots or screen captures on the device. It also prevents the content from being shown on display devices that don't have a secure video output. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might let users capture the screen contents as an image.
Camera: Block prevents access to the camera on the device. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow access to the camera.
Intune only manages access to the device camera. It doesn't have access to pictures or videos.
Default permission policy: This setting defines the default permission policy for requests for runtime permissions. Your options
- Device default: Use the device's default setting.
- Prompt: Users are prompted to approve the permission.
- Auto grant: Permissions are automatically granted.
- Auto deny: Permissions are automatically denied.
Date and Time changes: Block prevents users from manually setting the date and time. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to the set date and time on the device.
Volume changes: Block prevents users from changing the device's volume, and also mutes the master volume. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow using the volume settings on the device.
Factory reset: Block prevents users from using the factory reset option in the device's settings. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to use this setting on the device.
Safe boot: Block prevents users from rebooting the device into safe mode. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to reboot the device in safe mode.
Status bar: Block prevents access to the status bar, including notifications and quick settings. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users access to the status bar.
Roaming data services: Block prevents data roaming over the cellular network. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow data roaming when the device is on a cellular network.
Wi-Fi setting changes: Block prevents users from changing Wi-Fi settings created by the device owner. Users can create their own Wi-Fi configurations. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to change the Wi-Fi settings on the device.
Wi-Fi access point configuration: Block prevents users from creating or changing any Wi-Fi configurations. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to change the Wi-Fi settings on the device.
Bluetooth configuration: Block prevents users from configuring Bluetooth on the device. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow using Bluetooth on the device.
Tethering and access to hotspots: Block prevents tethering and access to portable hotspots. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow tethering and access to portable hotspots.
USB storage: Choose Allow to access USB storage on the device. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might prevent access to USB storage.
USB file transfer: Block prevents transferring files over USB. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow transferring files.
External media: Block prevents using or connecting any external media on the device. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow external media on the device.
Beam data using NFC: Block prevents using the Near Field Communication (NFC) technology to beam data from apps. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow using NFC to share data between devices.
Debugging features: Choose Allow to let users use debugging features on the device. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might prevent users from using the debugging features on the device.
Microphone adjustment: Block prevents users from unmuting the microphone and adjusting the microphone volume. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to use and adjust the volume of the microphone on the device.
Factory reset protection emails: Choose Google account email addresses. Enter the email addresses of device administrators that can unlock the device after it's wiped. Be sure to separate the email addresses with a semi-colon, such as
admin1@gmail.com;admin2@gmail.com
. If an email isn't entered, anyone can unlock the device after it's restored to the factory settings. These emails only apply when a non-user factory reset is run, such as running a factory reset using the recovery menu.When set to Not configured (default), Intune doesn't change or update this setting.
Network escape hatch: Enable allows users to turn on the network escape hatch feature. If a network connection isn't made when the device boots, then the escape hatch asks to temporarily connect to a network and refresh the device policy. After applying the policy, the temporary network is forgotten and the device continues booting. This feature connects devices to a network if:
- There isn't a suitable network in the last policy.
- The device boots into an app in lock task mode.
- Users are unable to reach the device settings.
When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might prevent users from turning on the network escape hatch feature on the device.
System update: Choose an option to define how the device handles over-the-air updates. Your options
- Device Default: Use the device's default setting.
- Automatic: Updates are automatically installed without user interaction. Setting this policy immediately installs any pending updates.
- Postponed: Updates are postponed for 30 days. At the end of the 30 days, Android prompts users to install the update. It's possible for device manufacturers or carriers to prevent (exempt) important security updates from being postponed. An exempted update shows a system notification to users on the device.
- Maintenance window: Installs updates automatically during a daily maintenance window that you set in Intune. Installation tries daily for 30 days, and can fail if there's insufficient space or battery levels. After 30 days, Android prompts users to install. This window is also used to install updates for Play apps. Use this option for dedicated devices, such as kiosks, as single-app dedicated device foreground apps can be updated.
Notification windows: When set to Disable, window notifications, including toasts, incoming calls, outgoing calls, system alerts, and system errors aren't shown on the device. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might show notifications.
Skip first use hints: Enable hides or skips suggestions from apps that step through tutorials, or hints when the app starts. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might show these suggestions when the app starts.
System security
- Threat scan on apps: Require (default) enables Google Play Protect to scan apps before and after they're installed. If it detects a threat, it may warn users to remove the app from the device. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might not enable or run Google Play Protect to scan apps.
Block Auto Update After Tuning Off Android Phone
Dedicated devices
Use these settings to configure a kiosk-style experience on your dedicated devices. You can configure devices to run one app, or run many apps. When a device is set with kiosk mode, only the apps you add are available. These settings apply to Android Enterprise dedicated devices. They don't apply to Android Enterprise fully managed devices.
Kiosk mode: Choose if the device runs one app or runs multiple apps.
Not configured: Intune doesn't change or update this setting.
Single app: Users can only access a single app on the device. When the device starts, only the specific app starts. Users are restricted from opening new apps or from changing the running app.
Select a managed app: Select the managed Google Play app from the list.
If you don't have any apps listed, then add some Android apps to the device. Be sure to assign the app to the device group created for your dedicated devices.
Important
When using single-app kiosk mode, dialer/phone apps may not function properly.
Multi-app: Users can access a limited set of apps on the device. When the device starts, only the apps you add start. You can also add some web links that users can open. When the policy is applied, users see icons for the allowed apps on the home screen.
Important
For multi-app dedicated devices, the Managed Home Screen app from Google Play must be:
- Added as a client app in Intune
- Assigned to the device group created for your dedicated devices
The Managed Home Screen app isn't required to be in the configuration profile, but it is required to be added as a client app. When the Managed Home Screen app is added as a client app, any other apps you add in the configuration profile are shown as icons on the Managed Home Screen app.
When using multi-app kiosk mode, dialer/phone apps may not function properly.
Add: Select your apps from the list.
If the Managed Home Screen app isn't listed, then add it from Google Play. Be sure to assign the app to the device group created for your dedicated devices.
You can also add other Android apps and web apps created by your organization to the device. Be sure to assign the app to the device group created for your dedicated devices.
Virtual home button: A soft-key button that returns users to the Managed Home Screen so users can switch between apps. Your options:
- Not configured (default): A home button isn't shown. Users must use the back button to switch between apps.
- Swipe up: A home button shows when a user swipes up on the device.
- Floating: Shows a persistent, floating home button on the device.
Leave kiosk mode: Enable allows Administrators to temporarily pause kiosk mode to update the device. To use this feature, the administrator:
- Continues to select the back button until the Exit kiosk button is shown.
- Selects the Exit kiosk button, and enters the Leave kiosk mode code PIN.
- When finished, select the Managed Home Screen app. This step relocks the device into multi-app kiosk mode.
When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might prevent administrators from pausing kiosk mode. If the administrator continues to select the back button, and selects the Exit kiosk button, then a message states that a passcode is required.
- Leave kiosk mode code: Enter a 4-6 digit numeric PIN. The administrator uses this PIN to temporarily pause kiosk mode.
Set custom URL background: Enter a URL to customize the background screen on the dedicated device. For example, enter
http://contoso.com/backgroundimage.jpg
.Note
For most cases, we recommend starting with images of at least the following sizes:
- Phone: 1080x1920 px
- Tablet: 1920x1080 px
For the best experience and crisp details, it's suggested that per device image assets be created to the display specifications.
Modern displays have higher pixel densities and can display equivalent 2K/4K definition images.
Wi-Fi configuration: Enable shows the Wi-Fi control on the Managed Home Screen, and allows users to connect the device to different WiFi networks. Enabling this feature also turns on device location. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might not show the Wi-Fi control on the Managed Home Screen. It prevents users from connecting to Wi-Fi networks while using the Managed Home Screen.
Bluetooth configuration: Enable shows the Bluetooth control on the Managed Home Screen, and allows users to pair devices over Bluetooth. Enabling this feature also turns on device location. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might not show the Bluetooth control on the Managed Home Screen. It prevents users from configuring Bluetooth and pairing devices while using the Managed Home Screen.
Flashlight access: Enable shows the flashlight control on the Managed Home Screen, and allows users to turn the flashlight on or off. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might not show the flashlight control on Managed Home Screen. It prevents users from using the flashlight while using the Managed Home Screen.
Media volume control: Enable shows the media volume control on the Managed Home Screen, and allows users to adjust the device's media volume using a slider. Dev c++ curso. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might not show the media volume control on Managed Home Screen. It prevents users from adjusting the device's media volume while using the Managed Home Screen, unless their hardware buttons support it.
Screen saver mode: Enable shows a screensaver on the Managed Home Screen when the device is locked or times out. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might not show a screensaver on the Managed Home Screen.
When enabled, also configure:
Set custom screen saver image: Enter the URL to a custom PNG, JPG, JPEG, GIF, BMP, WebP, or ICOimage. For example, enter:
http://www.contoso.com/image.jpg
www.contoso.com/image.bmp
https://www.contoso.com/image.webp
If you don't enter a URL, then the device's default image is used, if there's a default image.
Tip
Any file resource URL that can be turned into a bitmap is supported.
Number of seconds the device shows screen saver before turning off screen: Choose how long the device shows the screensaver. Enter a value between 0-9999999 seconds. Default is
0
seconds. When left blank, or set to zero (0
), the screen saver is active until a user interacts with the device.Number of seconds the device is inactive before showing screen saver: Choose how long the device is idle before showing the screensaver. Enter a value between 1-9999999 seconds. Default is
30
seconds. You must enter a number greater than zero (0
).Detect media before starting screen saver: Enable (default) doesn't show the screen saver if audio or video is playing on the device. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might show the screen saver, even if audio or video is playing.
Password
Disable lock screen: Choose Disable to prevent users from using Keyguard lock screen feature on the device. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to use the Keyguard features.
Disabled lock screen features: When keyguard is enabled on the device, choose which features to disable. For example, when Secure camera is checked, the camera feature is disabled on the device. Any features not checked are enabled on the device.
These features are available to users when the device is locked. Users won't see or access features that are checked.
Required password type: Enter the required password complexity level, and whether biometric devices can be used. Your options:
Device default
Password required, no restrictions
Weak biometric: Strong vs. weak biometrics (opens Android's web site)
Numeric: Password must only be numbers, such as
123456789
. Also enter:- Minimum password length: Enter the minimum length the password must have, between 4 and 16 characters.
Numeric complex: Repeated or consecutive numbers, such as '1111' or '1234', aren't allowed. Also enter:
- Minimum password length: Enter the minimum length the password must have, between 4 and 16 characters.
Alphabetic: Letters in the alphabet are required. Numbers and symbols aren't required. Also enter:
- Minimum password length: Enter the minimum length the password must have, between 4 and 16 characters.
Alphanumeric: Includes uppercase letters, lowercase letters, and numeric characters. Also enter:
- Minimum password length: Enter the minimum length the password must have, between 4 and 16 characters.
Alphanumeric with symbols: Includes uppercase letters, lowercase letters, numeric characters, punctuation marks, and symbols. Also enter:
- Minimum password length: Enter the minimum length the password must have, between 4 and 16 characters.
- Number of characters required: Enter the number of characters the password must have, between 0 and 16 characters.
- Number of lowercase characters required: Enter the number of lowercase characters the password must have, between 0 and 16 characters.
- Number of uppercase characters required: Enter the number of uppercase characters the password must have, between 0 and 16 characters.
- Number of non-letter characters required: Enter the number of non-letters (anything other than letters in the alphabet) the password must have, between 0 and 16 characters.
- Number of numeric characters required: Enter the number of numeric characters (
1
,2
,3
, and so on) the password must have, between 0 and 16 characters. - Number of symbol characters required: Enter the number of symbol characters (
&
,#
,%
, and so on) the password must have, between 0 and 16 characters.
Number of days until password expires: Enter the number of days, until the device password must be changed, from 1-365. For example, enter
90
to expire the password after 90 days. When the password expires, users are prompted to create a new password. When the value is blank, Intune doesn't change or update this setting.Number of passwords required before user can reuse a password: Use this setting to restrict users from creating previously used passwords. Enter the number of previously used passwords that can't be used, from 1-24. For example, enter
5
so users can't set a new password to their current password or any of their previous four passwords. When the value is blank, Intune doesn't change or update this setting.Number of sign-in failures before wiping device: Enter the number of wrong passwords allowed before the device is wiped, from 4-11.
0
(zero) might disable the device wipe functionality. When the value is blank, Intune doesn't change or update this setting.Note
Device Owner devices will not be prompted to set a password. The settings will be enforced and you will need to set the password manually. The policy enforcing this will report as failed until you set the password that meets your requirements.
Power settings
Time to lock screen: Enter the maximum time a user can set until the device locks. For example, if you set this setting to
10 minutes
, then users can set the time from 15 seconds up to 10 minutes. When set to Not configured (default), Intune doesn't change or update this setting.Screen on while device plugged in: Choose which power sources cause the device's screen to stay on when plugged in.
Users and Accounts
Add new users: Block prevents users from adding new users. Each user has a personal space on the device for custom Home screens, accounts, apps, and settings. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to add other users to the device.
User removal: Block prevents users from removing users. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to remove other users from the device.
Account changes (dedicated devices only): Block prevents users from modifying accounts. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to update user accounts on the device.
Note
This setting isn't honored on device owner (fully managed) devices. If you configure this setting, then the setting is ignored, and has no impact.
User can configure credentials: Block prevents users from configuring certificates assigned to devices, even devices that aren't associated with a user account. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might make it possible for users to configure or change their credentials when they access them in the keystore.
Personal Google Accounts: Block prevents users from adding their personal Google account to the device. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to add their personal Google account.
Applications
- Allow installation from unknown sources: Allow lets users turn on Unknown sources. This setting allows apps to install from unknown sources, including sources other than the Google Play Store. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might prevent users from turning on Unknown sources.
- Allow access to all apps in Google Play store: When set to Allow, users get access to all apps in Google Play store. They don't get access to the apps the administrator blocks in Client Apps. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might force users to only access the apps the administrator makes available in the Google Play store, or apps required in Client Apps.
- App auto-updates: Devices check for app updates daily. Choose when automatic updates are installed. Your options:
- Not configured: Intune doesn't change or update this setting.
- User choice: The OS might default to this option. Users can set their preferences in the managed Google Play app.
- Never: Updates are never installed. This option isn't recommended.
- Wi-Fi only: Updates are installed only when the device is connected to a Wi-Fi network.
- Always: Updates are installed when they're available.
Connectivity
Always-on VPN: Enable sets the VPN client to automatically connect and reconnect to the VPN. Always-on VPN connections stay connected. Or, immediately connect when users lock their device, the device restarts, or the wireless network changes.
Choose Not configured to disable always-on VPN for all VPN clients.
Important
Be sure to deploy only one Always-on VPN policy to a single device. Deploying multiple Always-on VPN policies to a single device isn't supported.
VPN client: Choose a VPN client that supports Always On. Your options:
- Cisco AnyConnect
- F5 Access
- Palo Alto Networks GlobalProtect
- Pulse Secure
- Custom
- Package ID: Enter the package ID of the app in the Google Play store. For example, if the URL for the app in the Play store is
https://play.google.com/store/details?id=com.contosovpn.android.prod
, then the package ID iscom.contosovpn.android.prod
.
- Package ID: Enter the package ID of the app in the Google Play store. For example, if the URL for the app in the Play store is
Important
- The VPN client you choose must be installed on the device, and it must support per-app VPN in work profiles. Otherwise, an error occurs.
- You do need to approve the VPN client app in the Managed Google Play Store, sync the app to Intune, and deploy the app to the device. After you do this, then the app is installed in the user's work profile.
- You still need to configure the VPN client with a VPN profile, or through an app configuration profile.
- There may be known issues when using per-app VPN with F5 Access for Android 3.0.4. For more information, see F5's release notes for F5 Access for Android 3.0.4.
Lockdown mode: Enable forces all network traffic to use the VPN tunnel. If a connection to the VPN isn't established, then the device won't have network access. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow traffic to flow through the VPN tunnel or through the mobile network.
Recommended global proxy: Enable adds a global proxy to the devices. When enabled, HTTP and HTTPS traffic, including some apps on the device, use the proxy you enter. This proxy is only a recommendation. It's possible some apps won't use the proxy. Not configured (default) doesn't add a recommended global proxy.
For more information on this feature, see setRecommendedGlobalProxy (opens an Android site). Little snitch 4.1 1 crack.
When enabled, also enter the Type of proxy. Your options:
Direct: Manually enter the proxy server details, including:
- Host: Enter the hostname or IP address of your proxy server. For example, enter
proxy.contoso.com
or127.0.0.1
. - Port number: Enter the TCP port number used by the proxy server. For example, enter
8080
. - Excluded hosts: Enter a list of host names or IP addresses that won't use the proxy. This list can include an asterisk (
*
) wildcard and multiple hosts separated by semicolons (;
) with no spaces. For example, enter127.0.0.1;web.contoso.com;*.microsoft.com
.
- Host: Enter the hostname or IP address of your proxy server. For example, enter
Proxy Auto-Config: Enter the PAC URL to a proxy autoconfiguration script. For example, enter
https://proxy.contoso.com/proxy.pac
.For more information on PAC files, see Proxy Auto-Configuration (PAC) file (opens a non-Microsoft site).
For more information on this feature, see setRecommendedGlobalProxy (opens an Android site).
Block Auto Update After Turning Off Android Computer
Work profile only
These settings apply to Android Enterprise enrollment types where Intune controls only the Work Profile, such as Android Enterprise Work profile enrollment on a personal or bring-your-own device (BYOD).
Work profile settings
Copy and paste between work and personal profiles: Block prevents copy-and-paste between work and personal apps. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to share data using copy-and-paste with apps in the personal profile.
Data sharing between work and personal profiles: Choose if apps in the work profile can share with apps in the personal profile. For example, you can control sharing actions within applications, such as the Share… option in the Chrome browser app. This setting doesn't apply to copy/paste clipboard behavior. Your options:
- Device default: The default sharing behavior of the device, which varies depending on the Android version. By default, sharing from the personal profile to the work profile is allowed. Also by default, sharing from the work profile to the personal profile is blocked. This setting prevents sharing of data from the work to the personal profile. On devices running versions 6.0 and later, Google doesn't block sharing from the personal profile to the work profile.
- Prevent any sharing across boundaries: Prevents sharing between work and personal profiles.
- Apps in work profile can handle sharing request from personal profile: Enables the built-in Android feature that allows sharing from the personal to work profile. When enabled, a sharing request from an app in the personal profile can share with apps in the work profile. This setting is the default behavior for Android devices running versions earlier than 6.0.
- No restrictions on sharing: Enables sharing across the work profile boundary in both directions. When you select this setting, apps in the work profile can share data with unbadged apps in the personal profile. This setting allows managed apps in the work profile to share with apps on the unmanaged side of the device. So, use this setting carefully.
Work profile notifications while device locked: Block prevents window notifications, including toasts, incoming calls, outgoing calls, system alerts, and system errors from showing on locked devices. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might show notifications.
Default app permissions: Sets the default permission policy for all apps in the work profile. Starting with Android 6, users are prompted to grant certain permissions required by apps when the app is launched. This policy setting lets you decide if users are prompted to grant permissions for all apps in the work profile. For example, you assign an app to the work profile that requires location access. Normally that app prompts users to approve or deny location access to the app. Use this policy to automatically grant permissions without a prompt, automatically deny permissions without a prompt, or let users decide. Your options:
- Device default
- Prompt
- Auto grant
- Auto deny
You can also use an app configuration policy to grant permissions for individual apps (Client Apps > App configuration policies).
Add and remove accounts: Block prevents users from manually adding or removing accounts in the work profile. For example, when you deploy the Gmail app into an Android work profile, you can prevent users from adding or removing accounts in this work profile. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow adding accounts in the work profile.
Note
Google accounts can't be added to a work profile.
Contact sharing via Bluetooth: Enable allows sharing and access to work profile contacts from another device, including a car, that's paired using Bluetooth. Enabling this setting may allow certain Bluetooth devices to cache work contacts upon first connection. Disabling this policy after an initial pairing/sync may not remove work contacts from a Bluetooth device.
When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might not share work contacts.
This setting applies to:
- Android work profile devices running Android OS v6.0 and newer
Screen capture: Block prevents screenshots or screen captures on the device in the work profile. It also prevents the content from being shown on display devices that don't have a secure video output. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow getting screenshots.
Display work contact caller-id in personal profile: Block doesn't show the work contact caller number in the personal profile. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might show work contact caller details.
This setting applies to:
- Android OS v6.0 and newer versions
Search work contacts from personal profile: Block prevents users from searching for work contacts in apps in the personal profile. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow searching for work contacts in the personal profile.
Camera: Block prevents access to the camera on the device in the work profile. The camera on the personal side is not affected by the setting. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow access to the camera.
Allow widgets from work profile apps: Enable allows users to put widgets exposed by apps on the home screen. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might disable this feature.
For example, Outlook is installed on your users' work profiles. When set to Enable, users can put the agenda widget on the device home screen.
Require Work Profile Password: Require forces a passcode policy that only applies to apps in the work profile. By default, users can use the two separately defined PINs. Or, users can combine the PINs into the stronger of the two PINs. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to use work apps without entering a password.
This setting applies to:
- Android 7.0 and newer with the work profile enabled
Minimum password length: Enter the minimum length the password must have, between 4 and 16 characters.
Maximum minutes of inactivity until work profile locks: Enter the length of time devices must be idle before the screen is automatically locked. Users must enter their credentials to regain access. For example, enter
5
to lock the device after 5 minutes of being idle. When the value is blank or set to Not configured, Intune doesn't change or update this setting.On devices, users can't set a time value greater than the configured time in the profile. Users can set a lower time value. For example, if the profile is set to
15
minutes, users can set the value to 5 minutes. Users can't set the value to 30 minutes.Number of sign-in failures before wiping device: Enter the number of wrong passwords allowed before the device is wiped, from 4-11.
0
(zero) might disable the device wipe functionality. When the value is blank, Intune doesn't change or update this setting.Password expiration (days): Enter the number of days until user passwords must be changed (from 1-365).
Required password type: Enter the required password complexity level, and whether biometric devices can be used. Your options:
- Device default
- Low security biometric: Strong vs. weak biometrics (opens Android's web site)
- Required
- At least numeric: Includes numeric characters, such as
123456789
. - Numeric complex: Repeated or consecutive numbers, such as
1111
or1234
, aren't allowed. - At least alphabetic: Includes letters in the alphabet. Numbers and symbols aren't required.
- At least alphanumeric: Includes uppercase letters, lowercase letters, and numeric characters.
- At least alphanumeric with symbols: Includes uppercase letters, lowercase letters, numeric characters, punctuation marks, and symbols.
Prevent reuse of previous passwords: Use this setting to restrict users from creating previously used passwords. Enter the number of previously used passwords that can't be used, from 1-24. For example, enter
5
so users can't set a new password to their current password or any of their previous four passwords. When the value is blank, Intune doesn't change or update this setting.Fingerprint unlock: Block prevents users from using the device fingerprint scanner to unlock the device. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to unlock the device using a fingerprint.
Smart Lock and other trust agents: Block prevents Smart Lock or other trust agents from adjusting lock screen settings on compatible devices. If devices are in a trusted location, then this feature, also known as a trust agent, lets you disable or bypass the device lock screen password. For example, bypass the work profile password when devices are connected to a specific Bluetooth device, or when devices are close to an NFC tag. Use this setting to prevent users from configuring Smart Lock.
When set to Not configured (default), Intune doesn't change or update this setting.
Password
These password settings apply to personal profiles on devices that use a work profile.
Minimum password length: Enter the minimum length the password must have, between 4 and 16 characters.
Maximum minutes of inactivity until screen locks: Enter the length of time devices must be idle before the screen is automatically locked. Users must enter their credentials to regain access. For example, enter
5
to lock the device after 5 minutes of being idle. When the value is blank or set to Not configured, Intune doesn't change or update this setting.On devices, users can't set a time value greater than the configured time in the profile. Users can set a lower time value. For example, if the profile is set to
15
minutes, users can set the value to 5 minutes. Users can't set the value to 30 minutes.Number of sign-in failures before wiping device: Enter the number of wrong passwords allowed before the device is wiped, from 4-11.
0
(zero) might disable the device wipe functionality. When the value is blank, Intune doesn't change or update this setting.Password expiration (days): Enter the number of days, until the device password must be changed, from 1-365. For example, enter
90
to expire the password after 90 days. When the password expires, users are prompted to create a new password. When the value is blank, Intune doesn't change or update this setting.Required password type: Enter the required password complexity level, and whether biometric devices can be used. Your options:
- Device default
- Low security biometric: Strong vs. weak biometrics (opens Android's web site)
- Required
- At least numeric: Includes numeric characters, such as
123456789
. - Numeric complex: Repeated or consecutive numbers, such as
1111
or1234
, aren't allowed. - At least alphabetic: Includes letters in the alphabet. Numbers and symbols aren't required.
- At least alphanumeric: Includes uppercase letters, lowercase letters, and numeric characters.
- At least alphanumeric with symbols: Includes uppercase letters, lowercase letters, numeric characters, punctuation marks, and symbols.
Prevent reuse of previous passwords: Use this setting to restrict users from creating previously used passwords. Enter the number of previously used passwords that can't be used, from 1-24. For example, enter
5
so users can't set a new password to their current password or any of their previous four passwords. When the value is blank, Intune doesn't change or update this setting.Fingerprint unlock: Block prevents users from using the device fingerprint scanner to unlock the device. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow users to unlock the device using a fingerprint.
Smart Lock and other trust agents: Block prevents Smart Lock or other trust agents from adjusting lock screen settings on compatible devices. If devices are in a trusted location, then this feature, also known as a trust agent, lets you disable or bypass the device lock screen password. For example, bypass the work profile password when devices are connected to a specific Bluetooth device, or when devices are close to an NFC tag. Use this setting to prevent users from configuring Smart Lock.
When set to Not configured (default), Intune doesn't change or update this setting.
System security
Threat scan on apps: Require enforces that the Verify Apps setting is enabled for work and personal profiles. When set to Not configured (default), Intune doesn't change or update this setting.
This setting applies to:
- Android 8 (Oreo) and above
Prevent app installations from unknown sources in the personal profile: By design, Android Enterprise work profile devices can't install apps from sources other than the Play Store. This setting allows administrators more control of app installations from unknown sources. Block prevents app installations from sources other than the Google Play Store in the personal profile. When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow app installations from unknown sources in the personal profile. By nature, work profile devices are intended to be dual-profile:
- A work profile managed using MDM.
- A personal profile that's isolated from MDM management.
Connectivity
Always-on VPN: Enable sets a VPN client to automatically connect and reconnect to the VPN. Always-on VPN connections stay connected. Or, immediately connect when users lock their device, the device restarts, or the wireless network changes.
When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might disable always-on VPN for all VPN clients.
Important
Be sure to deploy only one Always On VPN policy to a single device. Deploying multiple Always VPN policies to a single device isn't supported.
VPN client: Choose a VPN client that supports Always On. Your options:
- Cisco AnyConnect
- F5 Access
- Palo Alto Networks GlobalProtect
- Pulse Secure
- Custom
- Package ID: Enter the package ID of the app in the Google Play store. For example, if the URL for the app in the Play store is
https://play.google.com/store/details?id=com.contosovpn.android.prod
, then the package ID iscom.contosovpn.android.prod
.
- Package ID: Enter the package ID of the app in the Google Play store. For example, if the URL for the app in the Play store is
Important
- The VPN client you choose must be installed on the device, and it must support per-app VPN in work profiles. Otherwise, an error occurs.
- You do need to approve the VPN client app in the Managed Google Play Store, sync the app to Intune, and deploy the app to the device. After you do this, then the app is installed in the user's work profile.
- There may be known issues when using per-app VPN with F5 Access for Android 3.0.4. See F5's release notes for F5 Access for Android 3.0.4 for more information.
Lockdown mode: Enable forces all network traffic to use the VPN tunnel. If a connection to the VPN isn't established, then the device won't have network access.
When set to Not configured (default), Intune doesn't change or update this setting. By default, the OS might allow traffic to flow through the VPN tunnel or through the mobile network.
Next steps
Assign the profile and monitor its status.
You can also create dedicated device kiosk profiles for Android and Windows 10 devices.
Block Auto Update After Turning Off Android App
Configure and troubleshoot Android enterprise devices in Microsoft Intune.