Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fixes #5590 - IntuneAppProtectionPolicyAndroid #5681

Open
wants to merge 2 commits into
base: Dev
Choose a base branch
from

Conversation

dannyKBjj
Copy link
Contributor

Pull Request (PR) description

Added support for a number of properties to fix #5590
AllowedAndroidDeviceModels
AllowedOutboundClipboardSharingExceptionLength
BiometricAuthenticationBlocked
BlockAfterCompanyPortalUpdateDeferralInDays
BlockDataIngestionIntoOrganizationDocuments
ConnectToVpnOnLaunch
CustomDialerAppDisplayName
CustomDialerAppPackageId
DeviceLockRequired
FingerprintAndBiometricEnabled
KeyboardsRestricted
MessagingRedirectAppDisplayName
MessagingRedirectAppPackageId
MinimumWipePatchVersion
PreviousPinBlockCount
WarnAfterCompanyPortalUpdateDeferralInDays
WipeAfterCompanyPortalUpdateDeferralInDays
Alloweddataingestionlocations
AppActionIfAndroidDeviceManufacturerNotAllowed
AppActionIfAndroidDeviceModelNotAllowed
AppActionIfAndroidSafetyNetAppsVerificationFailed
AppActionIfAndroidSafetyNetDeviceAttestationFailed
AppActionIfDeviceComplianceRequired
AppActionIfDeviceLockNotSet
AppActionIfMaximumPinRetriesExceeded
AppActionIfUnableToAuthenticateUser
MobileThreatDefenseRemediationAction
DialerRestrictionLevel
MaximumAllowedDeviceThreatLevel
NotificationRestriction
ProtectedMessagingRedirectAppType
RequiredAndroidSafetyNetAppsVerificationType
RequiredAndroidSafetyNetDeviceAttestationType
RequiredAndroidSafetyNetEvaluationType
TargetedAppManagementLevels
ApprovedKeyboards
ExemptedAppPackages

This Pull Request (PR) fixes the following issues

- Fixes #5590

Task list

  • [x ] Added an entry to the change log under the Unreleased section of the file CHANGELOG.md.
    Entry should say what was changed and how that affects users (if applicable), and
    reference the issue being resolved (if applicable).
  • [x ] Resource parameter descriptions added/updated in the schema.mof.
  • [ x] Resource documentation added/updated in README.md.
  • [x ] Resource settings.json file contains all required permissions.
  • [x ] Examples appropriately added/updated.
  • [x ] Unit tests added/updated.
  • [x ] New/changed code adheres to DSC Community Style Guidelines.

@dannyKBjj
Copy link
Contributor Author

Hi, put this in a couple of weeks ago and not been reviewed?

Copy link
Collaborator

@FabienTschanz FabienTschanz left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Just asking myself if it wouldn't be better if we regenerate the entire resource, so much seems flaky to me (not really from your side, but the rest of the resource).

@dannyKBjj
Copy link
Contributor Author

Just asking myself if it wouldn't be better if we regenerate the entire resource, so much seems flaky to me (not really from your side, but the rest of the resource).

The project I'm working on is ending soon, so I wont have time to do it from scratch I don't think...

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

IntuneAppProtectionPolicyAndroid only partially supports App Protection policies
2 participants