
The Community
Stay up to date…
VMware End-User Computing Blog Bringing you the latest VMware EUC news, trends and product innovations.
- Introducing Omnissa, the former VMware End-User Computing businessby Renu Upadhyay on April 25, 2024 at 6:23 pm
As a marketing leader, one of the most exhilarating and rewarding undertakings is to define and activate a new brand. And it’s a rare opportunity to define a brand for an established business with industry-leading solutions. I’m privileged to have the opportunity to do both as the End-User […]
- Conditional access with Workspace ONE integrates seamlessly with Microsoft Entra ID and Google’s Context-Aware Access for macOSby Chris Morelock and Paul Mounkes on April 16, 2024 at 3:37 pm
As cyber threats become more complex, it’s crucial for organizations to implement robust security measures. In today’s treacherous digital landscape, securing users’ access to organizational resources is critical. Workspace ONE Unified Endpoint Management (UEM) includes conditional access […]
- Preparing for the digital evolution: Insights from the 2024 Gartner Digital Workplace Summitby Bryan Vest on April 5, 2024 at 4:55 pm
Representatives from the Broadcom End-User Computing (EUC) Division had the privilege of attending the Gartner Digital Workplace Summit March 18–19, 2024, in Grapevine, Texas. More than 900 attendees comprising digital workplace leaders, architects, and IT execs came from around the globe to […]
- Creating custom macOS security baselines with the macOS Security Compliance Project and Workspace ONEby Chris Morelock and Paul Mounkes on April 2, 2024 at 6:57 pm
Specific types of organizations are required to configure their endpoint security protocols in accordance with designated standards and benchmarks, such as those established by the National Institute of Standards and Technology (NIST) or the Center for Internet Security (CIS). Some organizations […]
- Introducing enhanced integration between Cisco ISE and Workspace ONE Unified Endpoint Managementby Sivapratap Reddy Chintam on March 28, 2024 at 2:19 am
We’re thrilled to announce the limited availability of Cisco Identity Services Engine (ISE) v3.1+ and Workspace ONE Unified Endpoint Management (UEM) integration with the Workspace ONE UEM 2402 release. This integration ensures that your end user’s devices can safely and securely connect and […]
- New management capabilities now available for macOS Activation Lock in Workspace ONEby Paul Mounkes on March 27, 2024 at 7:12 pm
Anyone who has had a laptop stolen knows the great frustration that comes with losing not only an expensive piece of tech but also the precious work and personal information, photos, and everything else that’s stored on it. Apple understands this, and long ago introduced a feature designed to […]
- Beware of CryptoChameleon, the new phishing threat that uses social engineering to trick victimsby Wendy Leung on March 26, 2024 at 3:01 pm
In the ever-evolving landscape of cyber threats, the CryptoChameleon phishing attack has emerged as a new example of how cybercriminals use advanced social engineering to gain access to victim’s accounts. Like a chameleon, the hackers camouflage themselves, but as trusted authorities, to blend in […]
- ViVE 2024: Why healthcare interoperability is key, and how we’re championing itby Amy Young on March 19, 2024 at 10:54 pm
Unmanaged devices. A mix of traditional and cloud-based applications. Data scattered across different cloud environments. This complexity in the healthcare environment can create a nightmare for data security, compliance, and efficient care delivery. Each separate tool adds another layer of chaos. […]
- Apple iOS 17.4 introduces updates, including alternative app stores and payment methodsby Adam Henry and Paul Mounkes on March 12, 2024 at 8:58 pm
In 2022, European Union (EU) watchdogs, the European Commission (EC), launched an ambitious project aimed at “ensuring fair and open digital markets.” Essentially, the goal of the Digital Markets Act (DMA) is to limit the power of designated technology “gatekeepers” and ensure they behave […]
- Workspace ONE continues to lead the charts in unified endpoint managementby Aditya Kunduri on March 8, 2024 at 2:55 am
In a rapidly evolving digital landscape, managing endpoints effectively has become paramount for enterprises worldwide. With the proliferation of diverse devices and the need for seamless connectivity, organizations are seeking robust solutions to streamline their endpoint management processes. […]

Adam Matthews Technology // IAM // EUC // Random Rubbish
- I asked ChatGPT to write me a bash script, and it worked (mostly), why do I need to know how to...by adam on December 18, 2022 at 11:12 pm
By now, ChatGPT has become pretty well known ( as of 18th Dec 2022). I’ve messed around with basic questions, but today I wanted to start to write a script that I could use with “OverSight” on Mac (https://objective-see.org/products/oversight.html). When you turn on your camera/mic, it can fire off a script with arguments. In this … Continue reading "I asked ChatGPT to write me a bash script, and it worked (mostly), why do I need to know how to code?"
- VMware ESXi – How to Remove an NFS Share that’s ‘In Use’by adam on December 14, 2022 at 11:35 am
I recently moved house, and as part of that a few things on my network changed. My NAS (A Synolofy DS8J) changed it’s IP Address. This caused an issue when ESXi was trying to get hold of the datastore. So, now this needs to be removed and replaced – I came across this error: After … Continue reading "VMware ESXi – How to Remove an NFS Share that’s ‘In Use’"
- Easily Automate your Lab with the vCenter APIby adam on February 14, 2022 at 6:00 pm
Learn how to use Python to call the VMware vCenter API to Start and Suspend Virtual Machines easily, and use Crontab to define the times it runs.
- Quickly Compress Video Files on macOSby adam on January 26, 2022 at 11:29 am
When you record your videos with Quicktime and you end up with 1.7 GB of a file, how do you shrink that?! I’ve been using this process for a couple of years now to optimise the output size of my demo videos, to make it easier to share them in presentations, and to keep my … Continue reading "Quickly Compress Video Files on macOS"
- WordPress – How to fix Jetpack connection errors, Fonts and Icons showing as squares with NGINXby adam on March 5, 2021 at 5:24 pm
I recently migrated https://blog.eucse.com/blog from running on Apache to Nginx. I found it helped a lot with utilization and speed (combined with a few more tweaks), but one thing I noticed after was Jetpack wouldn’t load correctly, and some fonts and icons were showing as squares. See examples of what I was seeing below: Resolution … Continue reading "WordPress – How to fix Jetpack connection errors, Fonts and Icons showing as squares with NGINX"

Arsen Bandurian: Technical Blog Digital Workspace, End User Computing, Enterprise Mobility, AutoID, WLANs, OSes and other technical stuff I happen to work with
- Check if a Microsoft Form comes from a trusted sourceby apcsb on November 6, 2023 at 10:14 am
When you open a Microsoft Form asking you for some sensitive data, do you know where will your data land? Could it be phishing? Read on to find out… Recently, I have received an email at work asking me to fill out a form with some of sensitive personal details (voluntary disclosure). I don’t mind... Continue Reading →
- Enhancing Windows Update Catalog metadata Accessibilityby apcsb on September 11, 2023 at 7:30 am
Microsoft has recently released a major update to the Windows Update catalog back-end, adding crucial information such as CVEs (Common Vulnerabilities and Exposures) addressed by the update and the CVE Score directly info API. This information is essential for Threat and Vulnerability Management decisions as well as Patch management and many organizations pay $$ for... Continue Reading →
- Quickly validate and enable manual application uninstall via Intune Company Portal using Graph APIby apcsb on August 3, 2023 at 7:04 am
I am back and the titles are getting longer! If you are an Intune admin, you will probably be happy to know that one of the most required features has landed: Uninstall Win32 and Microsoft store apps using the Windows Company Portal. One thing you need to be aware of, is that this feature is... Continue Reading →
- Building a custom Windows Update Report p1: Parsing HTML via PowerShell on modern systems (no IE)by apcsb on July 28, 2022 at 7:30 am
Wow, it’s been a while! A customer of mine recently wanted a detailed report that should include info such as how many weeks is the Windows on the machine behind the latest available Security Update. We’ve found to a way to combine Intune Data Warehouse and PowerBI to pull data that allows to identify the... Continue Reading →
- A case of OneDrive Personal Vault not coming up (0x8031000a, MDM, GPO and BitLocker)by apcsb on March 18, 2022 at 6:23 pm
Today I wanted to enable the Personal Vault feature on my Home PC. While following the wizard I got an error 0x8031000a “Your organization requires your device to join the domain before you can use the Personal Vault”. What does this have to do with MDM. GPO and BitLocker troubleshooting? Here’s some quick Friday entertainment!... Continue Reading →

- What's new (so far) for enterprise in Android 16by Jason Bayton on January 30, 2025 at 12:00 am
A little earlier in the year, Android 16 beta 1 has just landed! With the first beta available, it's time to take a look at what's new, so far, in Android 16 "Baklava". This is, as last year, a non-definitive and unconfirmed list of changes. Like the work profile changes in Android 14 things can change at any point and without warning. Here we go! No bump to minimum SDK version for installation of apps # The first beta does not include a change to minimum SDK for app installation. Will it come later? We shall see. For context, every year now since 14 the minimum version an application must target has increased. In Android 15 it was 24, in 14 it was 23.. If you're interested in what "targeting" is, it looks like this within an application's configuration: defaultConfig { applicationId = "org.bayton.example" minSdk = 24 targetSdk = 23 versionCode = 1 versionName = "1.0" } Minimum SDK is the lowest version of Android an application will support, this typically changes when new features introduced could cause compatibility issues. It could also change when a developer no longer wishes to support an older version of Android. In either case the application will no longer be available for installation from Google Play on an affected device, and will error when sideloaded. With the shift in timing for this release it's not clear if this'll be mandated so soon after the bump to 24 in 15, or if that'll come in a quarterly release at a later point. Currently 16 follows 15: only apps that target Android 7.0 - API level 24 - or later will be permitted. jason@MBP adb install app-release.apk Performing Streamed Install adb: failed to install app-release.apk: Failure [INSTALL_FAILED_DEPRECATED_SDK_VERSION: App package must target at least SDK version 24, but found 23] To reiterate my sentiment from last year on this topic: As ever, we're talking about applications targeting a version of Android 10+ years old. While some organisations with line-of-business apps that haven't seen an update in half a decade may balk at the idea of getting their applications updated or rewritten, the justification behind this limitation is solid - security. Where apps targeting <6.0 were able to abuse the old permissioning system (pre-runtime!), apps targeting 7.0 are still able to abuse device administrator and similar APIs. This isn't something you want potentially leveraged directly or indirectly on your managed estate. App functions control # Not too much research has been done about this feature arriving in 16, but from what I've found, this looks like a new way of allowing applications to interact with one another through the publishing of "functions" an app can perform. Google's example here suggests an assistant app can search on-device for applications with a known function for creating a note, which replaces a slightly more convoluted approach app developers have to take today: An assistant app is trying to fulfill the user request "Save XYZ into my note". The assistant app should first list all available app functions as AppFunctionStaticMetadata documents from AppSearch. Then, it should identify an app function that implements the CreateNote schema. Finally, the assistant app can invoke executeAppFunction(ExecuteAppFunctionRequest, Executor, CancellationSignal, OutcomeReceiver) with the functionIdentifier of the chosen function. This feels, and not just because of the example used, like it'll make the lives of Gemini, ChatGPT, and many other assistant application developers far easier. What I don't get from the example offered is how to target apps. I could have Keep, Obsidian, and several other apps offering a function to create a note. I'm sure this will be explained in due course though (if it isn't already and I just missed it). For enterprise, Google has added a few restrictions on app functions; they can currently be disabled outright, and disabled cross-profile. I'm hopeful we'll see this ecpand to follow Credential Manager and Widget APIs that allow a block with package exclusions for greater control. We'll see. Disallow NFC radio # Originally found in the Android 15 documentation, this one was referenced in the UserManager APIs, but never ultimately landed in 15. As it says on the tin. If you're thinking "Don't we already have an API for NFC?" Yes we do, but that's to control the beaming of data between devices. This is a full on radio disable and will probably live under DeviceRadioState in AMAPI at some point later. As of this release it's now officially showing up as a Baklava feature. Disallow Thread Network # Here's another previously-referenced feature to show up confirmed for Baklava. This is related to comms with thread devices. Again, it's a cut-and-dry, simple restriction. More details on its use will come in time. That's not all folks! # This is extremely short and sweet given how early in the process we are for 16. Expect several more betas with several more changes. Check back here again soon!
- What's new (so far) for enterprise in Android 16by Jason Bayton on January 30, 2025 at 12:00 am
A little earlier in the year, Android 16 beta 1 has just landed! With the first beta available, it's time to take a look at what's new, so far, in Android 16 "Baklava". This is, as last year, a non-definitive and unconfirmed list of changes. Like the work profile changes in Android 14 things can change at any point and without warning. Here we go! No bump to minimum SDK version for installation of apps # The first beta does not include a change to minimum SDK for app installation. Will it come later? We shall see. For context, every year now since 14 the minimum version an application must target has increased. In Android 15 it was 24, in 14 it was 23.. If you're interested in what "targeting" is, it looks like this within an application's configuration: defaultConfig { applicationId = "org.bayton.example" minSdk = 24 targetSdk = 23 versionCode = 1 versionName = "1.0" } Minimum SDK is the lowest version of Android an application will support, this typically changes when new features introduced could cause compatibility issues. It could also change when a developer no longer wishes to support an older version of Android. In either case the application will no longer be available for installation from Google Play on an affected device, and will error when sideloaded. With the shift in timing for this release it's not clear if this'll be mandated so soon after the bump to 24 in 15, or if that'll come in a quarterly release at a later point. Currently 16 follows 15: only apps that target Android 7.0 - API level 24 - or later will be permitted. jason@MBP adb install app-release.apk Performing Streamed Install adb: failed to install app-release.apk: Failure [INSTALL_FAILED_DEPRECATED_SDK_VERSION: App package must target at least SDK version 24, but found 23] To reiterate my sentiment from last year on this topic: As ever, we're talking about applications targeting a version of Android 10+ years old. While some organisations with line-of-business apps that haven't seen an update in half a decade may balk at the idea of getting their applications updated or rewritten, the justification behind this limitation is solid - security. Where apps targeting <6.0 were able to abuse the old permissioning system (pre-runtime!), apps targeting 7.0 are still able to abuse device administrator and similar APIs. This isn't something you want potentially leveraged directly or indirectly on your managed estate. App functions control # Not too much research has been done about this feature arriving in 16, but from what I've found, this looks like a new way of allowing applications to interact with one another through the publishing of "functions" an app can perform. Google's example here suggests an assistant app can search on-device for applications with a known function for creating a note, which replaces a slightly more convoluted approach app developers have to take today: An assistant app is trying to fulfill the user request "Save XYZ into my note". The assistant app should first list all available app functions as AppFunctionStaticMetadata documents from AppSearch. Then, it should identify an app function that implements the CreateNote schema. Finally, the assistant app can invoke executeAppFunction(ExecuteAppFunctionRequest, Executor, CancellationSignal, OutcomeReceiver) with the functionIdentifier of the chosen function. This feels, and not just because of the example used, like it'll make the lives of Gemini, ChatGPT, and many other assistant application developers far easier. What I don't get from the example offered is how to target apps. I could have Keep, Obsidian, and several other apps offering a function to create a note. I'm sure this will be explained in due course though (if it isn't already and I just missed it). For enterprise, Google has added a few restrictions on app functions; they can currently be disabled outright, and disabled cross-profile. I'm hopeful we'll see this ecpand to follow Credential Manager and Widget APIs that allow a block with package exclusions for greater control. We'll see. Disallow NFC radio # Originally found in the Android 15 documentation, this one was referenced in the UserManager APIs, but never ultimately landed in 15. As it says on the tin. If you're thinking "Don't we already have an API for NFC?" Yes we do, but that's to control the beaming of data between devices. This is a full on radio disable and will probably live under DeviceRadioState in AMAPI at some point later. As of this release it's now officially showing up as a Baklava feature. Disallow Thread Network # Here's another previously-referenced feature to show up confirmed for Baklava. This is related to comms with thread devices. Again, it's a cut-and-dry, simple restriction. More details on its use will come in time. That's not all folks! # This is extremely short and sweet given how early in the process we are for 16. Expect several more betas with several more changes. Check back here again soon!
- Android 15: What's new for enterprise?by Jason Bayton on October 31, 2024 at 12:00 am
Android 15 launched officially for Pixel on October 15th. This was about a month and a half after the release to AOSP on September 3rd. It has been a rather odd series of events this year; Pixel typically receives the latest and greatest version of Android in tandem with its release to AOSP, and the marketing and messaging goes out in unison for Android as a whole, but with Pixel's delay it caused something of an anticlimactic debut for AOSP, with most of the Android 15 blogs and announcements only really happening at Pixel's launch. Hopefully that doesn't become the norm, I'm not a fan of delaying announcements until an OEM - Pixel or otherwise - is ready with their own implementation; I can't imagine Google would have done this if Oppo, Samsung, HMD or others asked for the same. That said, here we are. I could have covered this post off for the most-part after the AOSP drop, I chose to wait until Google released their marketing materials. AOSP/developer docs rarely tell the whole story of enterprise support in an Android release, and 15 has been no different; I'd covered pretty much everything I found for AOSP in What's new (so far) for enterprise in Android 15 and so it was the wider Google Play Services and undocumented functionalities that were left to be covered. The below aims to provide a comprehensive overview of enterprise features, so may skip some items mentioned in the blog from April. Feel free to jump back there (link above) for more general Android 15 features. Let's start with a headline feature. Private Space # Android 15 introduces Private Space, the ability for users to protect a selection of apps in a private, additionally-authenticated profile on the device. These applications are isolated - similar to a work profile - from the rest of the applications on the primary parent profile. When Google announced Private Space with 15, I wrongfully anticipated this to be a mostly non-enterprise feature that wouldn't coexist in the management space. After all, it comes across as the work profile for unmanaged devices, in a way (certainly the tech it's built on tells me this). But here we are! The multiple work profiles on one device I've been asking for that Google said they'd never support 😁. Default behaviour for managed devices # The way this is managed is nuanced, per Google: The default value for an unmanaged user is false. For users with a device owner set, the default value is true and the device owner currently cannot change it to false. On organization-owned managed profile devices, the default value is false but the profile owner can change it to true via the parent profile to block creating of private profiles on the personal user. So in other words Private Space is disabled for fully managed devices by default, and cannot be enabled. For work profile-enabled company-owned devices, this can be managed. In testing, my fully managed device does indeed fail to create a Private Space, but doesn't indicate why - it simply fails: An interjection from the DPC to say this isn't possible would tremendously improve the UX. General management policies in the Private Space # If you're concerned the Private Space may become a wild-west of hidden app and user activity, fret not! Policies that have previously applied device-wide, such as the installation of apps from unknown sources, are still device-wide. The Private Space adopts these restrictions with no additional management overhead. Application management in the Private Space # While it's blocked on fully managed devices (which would be a great use case for a reversed COPE, I'll touch on below), it's very much possible to create a Private Space in COPE and co-exist with the work profile. Hang on, you may be thinking, doesn't that just mean users can add apps to a Private Space if they're not permitted to add them to their personal profile? As it turns out, no. Android 15 for business introduces the ability to apply a limited set of security restrictions to specific apps outside the Work Profile. Existing personal app allowlist or blocklist policies can be extended to the new private space feature. In the future, additional privacy preserving security configurations for core apps will be introduced and made backward compatible with Android 15. via The policies applied for permitted or blocked apps in a COPE deployment scenario also apply to the Private Space for AMAPI enrolments. CustomDPC EMMs will gain the same functionality at a later date (no ETA provided by Google). The case for Private Space on fully managed devices # It popped up in the AE Customer Community and I think it's worth further discussion: I quite like the prospect of reversing the existing COPE model to fully manage the device, but have an inaccessible profile (Private Space) for workers. Maximum control of the device with a lower-perceived, but potentially acceptable level of privacy for workers. As indicated for pool/shared devices where you auth, but can pop a few personal apps for break/other reasons the admins can ultimately remove at will.. I like it. Private Space has obviously not been enabled on fully managed devices due to the privacy concerns, I would assume, previously associated with work profiles on fully managed devices. Furthermore, I would expect there are nuances within a fully managed and dedicated use cases (which are mostly shared under the Device Owner (DO) ownership model) that would render this feature incompatible and possibly cause problems. It's also likely a lot of work resurrecting deprecated approaches to cross-profile policies and such that would bring this much closer to pre-11 Android fully managed devices with work profiles.. ..but it could be disabled by default, as it is for fully managed devices, and in organisations that want to allow a reverse-COPE wherein personal apps and data live in a separately encrypted, isolated container with limited cross-profile oversight (personal usage policies would have to apply on fully managed only, just for Private Space), it could work. Supporting this would further add the flexibility organisations want as the personally-owned vs company-owned debate rages on amongst admins. What Private Space isn't # Fort Knox. Unfortunately, and Google to their credit do highlight this, Private Space is still a profile running within Android; the applications installed in this space can be detected with relative ease and so although it makes it extremely difficult to access app data, it doesn't prevent the determined from piecing together a perception of someone based on the apps they're hiding away. Assuming they have access to the device. Giant Private Space icons added in PACKAGE SEARCH for emphasis only. I do feel it could be improved, for example with the work profile implementation there are policies that prevent an app inside the profile from locating applications outside of it, so if I run PACKAGE SEARCH within a work profile, I cannot see the user apps installed in the parent profile. I appreciate this is not 1:1, effectively asking apps in the parent profile to be blocked from running package manager searches on any packages flagged against the Private Space, but I'd like to believe it's possible. So that's Private Space. Next? COPE: Enhancements to company-owned work profiles (COPE) # Google has been busy this year boosting the functionality of the company-owned work profile deployment scenario, and it's a trend I'm here for! Still struggling with the loss of work profiles on fully managed devices, every small bump in functionality that regains some control over the parent (personal) profile of a company-owned device is nothing short of a treat. Here's what's new in Android 15: Control of parent profile screen settings in company-owned work profile deployment scenarios # For company-owned devices running work profile, the following previously fully managed-only restrictions can be applied to devices: Screen off timeout (not to be confused with time to lock, which still supersedes this in terms of hierarchy) Screen brightness (the actual brightness or the screen) Screen brightness mode (manual or automatic) Google announced these as power management controls, I suppose they could contribute to lower power consumption at the cost of user satisfaction if you were to enforce fixed brightness on personal-use devices. They could also contribute to significantly higher power consumption. I'm not sure what use cases were identified here that led to it being framed this way, but I imagine this could be a frustrating experience for knowledge workers if not implemented by organisations appropriately; who could use a device outside on a Summer's day while being limited to 30% brightness? Who would want to check an incoming call or notification in the middle of the night with a screen that doesn't adapt to the ambient conditions of the room, but rather turn on at 100% brightness? In contrast, enforcing automatic would be a sensible default. Be mindful if deploying fixed brightness or brightness modes to personal-use devices. Application defaults in the personal profile for company-owned work profile devices # Extending further control of the personal side of the device for COPE deployments, Google is allowing organisations in Android 15 to set default applications for the dialler, messaging app, and browser. To be absolutely clear, these defaults will be whatever the Android device ships with, so it wouldn't be possible to set Edge as a default in the personal profile across a managed estate. Rather, Samsung may default to Samsung Internet, Pixel to Chrome, etc. This avoids a potential privacy risk in allowing organisations to set their preferred apps as the personal default, complete with whatever identifying information and usage data they may be able to extract from the personal profile and into corporate servers. By implementing these defaults, organisations prevent the opposite scenario where a user may choose to use a non-recommended (or downright potentially harmful app) as their default in the personal profile, and open the device up to additional security risks. Google states these must be initially configured at provisioning time. That is to say set in the policy applied at the time of enrolment. If being set retrospectively, as would be required for any existing device updating to Android 15, this can be done through the use of allowlists: The default messaging app can be set at any time. To enforce OEM defaults for dialler and browser after set up, this control must be combined with an app allowlist. These do not apply to Android 15's Private Space (discussed below), as these applications should not be present in the Space to begin with. Security & privacy changes # Android 15 additionally introduces a fair few security improvements also, some of which include: Migration of events from logcat to SecurityLog # From 15 we'll start seeing more information provided to SecurityLog. For those who've debugged an Android device under management, unless you're working with the device directly, pulling & reviewing logcat can be a pain. As SecurityLog, along with NetworkLog, can be fetched through the EMM, this offers a much simpler option and ongoing review of the respective logs. The intention is to more closely align with NIAP requirements, and allow for quick review of administrative device changes. In addition, Android adds an event for the backup service being toggled by an admin which will also now be available for admins from 15 when pulling security logs. Improvements to Factory Reset Protection # Though there are no enterprise-specific changes to factory reset protection, I believe it's important to highlight some changes made to how it works within the context of an enterprise device, namely: Enabling OEM unlock in developer settings will no longer deactivate FRP Bypassing the setup wizard, which isn't uncommon for dedicated devices/OEMs, will no longer deactivate FRP. Adding accounts, passwords, and applications will no longer be possible while FRP is active Going forward it will be evermore important to ensure both FRP, and enterprise FRP (wherein organisations set the allowlisted Google accounts), are properly maintained and processes correctly followed for resetting devices, if the EMM does not turn FRP off by default (hi, Omnissa..) A bump to minimum SDK version for installation of apps # As expected, the restriction on installing applications targeting very old versions of Android is getting a bump. In Android 15 it will no longer be possible to install apps targeting API level 23 - Android Marshmallow / 6.0 - or older. Only apps that target Android 7.0 - API level 24 - or later will be permitted. jason@MBP Downloads % adb install app-release.apk Performing Streamed Install adb: failed to install app-release.apk: Failure [INSTALL_FAILED_DEPRECATED_SDK_VERSION: App package must target at least SDK version 24, but found 23] Just as last year, we're talking about applications targeting a version of Android 10+ years old. While some organisations with line-of-business apps that haven't seen an update in half a decade may balk at the idea of getting their applications updated or rewritten, the justification behind this limitation is solid - security. Where apps targeting <6.0 were able to abuse the old permissioning system (pre-runtime!), apps targeting 7.0 are still able to abuse device administrator and similar APIs. This isn't something you want potentially leveraged directly or indirectly on your managed estate. Restrictions on device identifiers for personally-owned devices # From Android 15, applications with the permission android.permission.MANAGE_DEVICE_POLICY_CERTIFICATES will be able to fetch getEnrollmentSpecificId, which is an enrolment-specific, unique device identifier that persists across re-enrolments when done so into the same deployment scenario (i.e. fully managed or personally-owned work profile), by the same vendor agent, into the same enterprise (organisation/bind). It is an alternative to identifiers such as IMEI and serial number, which Google no longer grants access to for applications without the appropriate device or profile owner role, or DELEGATION_CERT_INSTALL via policy, and becomes the default and only option for fetching a unique device identifier for personally-owned work profile devices in future. To be clear - applications in a personally-owned work profile deployment up to now with the delegated permission of DELEGATION_CERT_INSTALL have been able to fetch a device serial number with relative ease, something that defeats the entire purpose of restricting access to the identifiers, considered to be personally identifiable information, in the first place. That loophole is closing. Head's up At time of writing there's a bug in 15 - on the Pixel 9 Pro XL at least - preventing delegated scopes from being retrieved by managed apps within the work profile. It works fine in the parent profile. If you'd like to validate this yourself, here's a snippet to call from within an application: val dpm = context.getSystemService(Context.DEVICE_POLICY_SERVICE) as DevicePolicyManager val delegatedScopes = dpm.getDelegatedScopes(null, context.packageName) Security exceptions for sensors-related permissions # From 15, device admins targeting API level 35, including DPCs and device admin role holders, will begin throwing security exceptions when attempting to set permissions for some sensors-specific permissions, including: Manifest.permission.ACCESS_FINE_LOCATION Manifest.permission.ACCESS_BACKGROUND_LOCATION Manifest.permission.ACCESS_COARSE_LOCATION Manifest.permission.CAMERA Manifest.permission.RECORD_AUDIO Manifest.permission.RECORD_BACKGROUND_AUDIO Manifest.permission.ACTIVITY_RECOGNITION Manifest.permission.BODY_SENSORS The two scenarios where this is expected to happen is: The calling agent is a profile owner, rather than a device owner (so work profile deployments, not fully managed) The agent is a device owned on a fully managed device, but has EXTRA_PROVISIONING_GRANT_OPT_OUT set during the provisioning process. While this has been in place since Android 12, previously this would have silently failed. In future security exceptions will be triggered which should make it easier to debug. New restrictions # It wouldn't be an Android release unless we saw a few new features to manage. Here's the run-down: Content protection policy # The content protection policy offers admin control of a new feature for real-time threat detection within the Google Play Protect arsenal of protections covered in a prior security blog from February. For Pixel devices, the toggle for this is in Settings > Security & privacy > More security & privacy > Scanning for deceptive apps. It is buried deep in Settings. When the configuration is unspecified, currently the respective toggle is off for fully managed devices. Switching to enforced then enables the setting. This is a great approach, sympathetic to the feedback its announcement generated from administrators already frustrated with overbearing Google Play Protect policies that cannot be disabled (full disclosure, I'm generally in favour of GPP, but I'm aware of the problems it causes for some organisations), while allowing its use for organisations that feel they need it. For EMM vendors, this is already present in AMAPI as contentProtectionPolicy under AdvancedSecurityOverrides. Android 15 also introduces the permission android.permission.MANAGE_DEVICE_POLICY_CONTENT_PROTECTION for apps which are not the device or profile owner to be able to interface with this API. Google Play Protect app scanning changes # In a related note, in September 2024 Google made a considerable change that will placate any organisation deploying sideloaded enterprise applications, including those installed via the EMM DPC (agent), internal services, or sideloaded in more traditional ways. These applications will no longer be sent to Google for scanning, and no longer prompt end users to take any action against them unless they are known to Google to be potentially harmful. More information here. Disallow NFC radio # As it says on the tin. If you're thinking "Don't we already have an API for NFC?" Yes we do, but that's to control the beaming of data between devices. This is a full on radio disable and will probably live under DeviceRadioState in AMAPI at some point later. This appears to be a natural progression from the earlier DISALLOW_CHANGE_NEAR_FIELD_COMMUNICATION_RADIO which prevents the turning on/off NFC in settings. eSIM management # eSIM has been given a respectable amount of attention in 15. Here's what's new: Disallow SIM Globally # The API I found earlier in the year appears to be a subset of a larger eSIM management framework being introduced with Android 15. For completeness, as the earlier post was quite light, here's what Disallow SIM Globally actually means: Available for both fully managed and company-owned work profile devices, disallow SIM globally (DISALLOW_SIM_GLOBALLY) is an eSIM restriction to globally prevent the user download of eSIMs to a device. While I earlier assumed it may have been globally disabling cellular, killing the radio and hiding the respective settings, status bar messaging, and so forth (useful particularly for lower-cost tablets that often come with cellular) this is not the case. In my testing, with the restriction enabled I was able to go into settings, begin eSIM setup with the scan of a QR code, and only then did it prevent setup with a generic error message that suggests there's a problem with the eSIM rather than a policy restriction in place: The experience could be improved dramatically here just with the addition of management UI, and preferably earlier in the process of adding an eSIM, also. Expanding 9.0 APIs for eSIM management # More broadly Android 15 introduces eSIM configuration capabilities via EMM. Based on what I've been able to find, eSIM management is directly associated with eSIM subscription management introduced in Android 9.0, and has been expanded in 15 to allow remote configuration via EMM, or the appropriate permission: Starting from Android Build.VERSION_CODES.VANILLA_ICE_CREAM, if the caller has the android.Manifest.permission#MANAGE_DEVICE_POLICY_MANAGED_SUBSCRIPTIONS permission or is a profile owner or device owner, then the downloaded subscription will be managed by that caller. In case the caller is device owner or profile owner of an organization-owned device, switchAfterDownload can be set to true to automatically enable the subscription after download. If the caller is a profile owner on non organization owned device switchAfterDownload should be false otherwise the operation will fail with EMBEDDED_SUBSCRIPTION_RESULT_ERROR. It would appear EMM vendors with either custom DPCs or via AMAPI will be able to lean into this API from 15 to add and remove EUICC subscriptions. Neat. Further, it will even support partial payloads! Providing the device has already been registered with an eSIM on a carrier's SMDP+ server, it will allow the device to reach out to that server, declare itself and get it's eSIM. This has the potential to significantly simplify eSIM management, reducing the number of eSIM configurations necessary for large deployments. Personally-owned device users will be able to remove the configured eSIM, though for company-owned devices, the additional policy DISALLOW_CONFIG_MOBILE_NETWORKS can be set to ensure eSIMs aren't deleted. Disallow assist content # This restriction allows administrators to prevent privileged apps, such as Assistant, from receiving contextual device information. These include screenshots, package names, and more. Useful for admins wishing to reduce the sprawl of information access privileged apps can have. This is scope-specific, so on fully managed devices will apply device-wide, but on profile-enabled devices restricts only to the managed profile. Circle to search # Relatively straightforward, an enterprise API is being introduced to lock down circle to search - one of the most hyped up features I've seen in a long time.. but probably not something organisations want accidentally invoking on dedicated devices while customers try to order a Big Mac! This is a nice continuation of assist content above, limiting the amount of data being sent to Google services. Widget management is back?! # With Android 15, setKeyguardDisabledFeatures has been expanded with widget management to coincide with the re-introduction of lockscreen widgets for tablet devices. At this time it appears to only apply to widgets in managed profiles, with Google explicitly stating: ..the profile owner of an organization-owned managed profile can set KEYGUARD_DISABLE_WIDGETS_ALL which affects the parent user when called on the parent profile. More testing is needed to determine why this isn't available for fully managed devices. To note for wider context, lock screen widgets were removed way back in 5.0 citing, if I remember correctly, low use. With the recent focus on tablets, and Apple adding their own, Google clearly figured they matter again! Other changes and requirements for 15 # Rounding off what's new, here are some additional features that don't fit into the above categories: Platform signed permission management # When a vendor works with an OEM to get their application platform singed, the application is granted all system-level permissions available on the device. As you can imagine, that is an unprecedented level of device access to data and services reserved normally for only the OEM system apps, and Google's preloaded suite of applications. In Android 15, Google is introducing system permission management, allowing OEMs to grant or deny permissions to signed applications that allows for the considerable down-scoping of access of a signed app to only the explicit permissions required to function. This won't apply to system apps bundled with a set of permissions in the OEM system image, but should permissions change in a later system app update, these permissions would also be denied automatically unless allowlisted in the respective system configuration. There's an additional config to allow platform-signed shared UIDs for non-system applications that have additionally previously required access to this. There are new alerts in logging to determine the permissions applications are no longer retaining access to, which vendors should already start looking at today to avoid loss of functionality. Knowing how many enterprise vendors lean on platform signature permissions today (basically most EMMs, several SaaS products, etc), this has the potential to cause headaches as 15 lands on devices, unless OEMs and vendors work together proactively to avoid this. Screen recording improvements # If you're like me and record your screen far too often to demonstrate anything from a device feature to a bug, user guides and more, you'll be pleased to hear the previously Pixel-only feature introduced in Android 14 is coming to the wider ecosystem with the 15 update. Now users can limit screen sharing to just the app they want to show, and no longer fret on the possibility to showing something that may not be appropriate for the context. Continuing the theme of recording, this is not so much an enterprise feature in and of itself explicitly, but Android 15 will alert apps when the screen is being recorded, allowing them to hide contents. I can imagine this might be useful for enterprise applications across the board to bolster DLP (data loss prevention), and based on murmurings in Tech News, Google is testing restrictions in Chrome to prevent sensitive information from being recorded (addresses, card details, passwords, etc). Broader system update visibility # From 15, applications granted the permission android.permission.MANAGE_DEVICE_POLICY_QUERY_SYSTEM_UPDATES will be able to obtain information about a pending system update. This softens the current requirements that an application be a device or profile owner in order to fetch this information. What this doesn't do, unfortunately, is offer any more information about the update(s) available. Today we can see an update is available and that it's a security update. This API needs to be updated to show - build info, size, how long it's been available (not just when first detected), - SPL/Android version All of this is offered either through GOTA, Google's OTA management server many OEMs are encouraged to leverage (some don't of course, consider e-FOTA from Samsung, or HMD's new FOTA platform), or the build fingerprint of the package itself. Check MTE status # Expanding on the options for getting and setting MTE policies in Android 14, in 15 it will now be possible to merely query the current state (evidently something that should have, but didn't, quite make it to the 14 release!) Deeper dedicated device experience management # With Better Together Enterprise, AKA the new customer signup flow, Google is introducing a new provisioning option for dedicated devices, in addition to PERSONAL_USAGE_ALLOWED and PERSONAL_USAGE_DISALLOWED, Google are introducing a third allowPersonalUsage AMAPI enrolment token configuration option of DEDICATED_DEVICE. That alone isn't an Android 15 feature, but an accompanying flag OEMs can set from 15 within the device software declaring it a dedicated device should give many dedicated device-based organisations a reason to take note. Such distinguishing features between knowledge worker devices and the new dedicated devices flag include: Setup Wizard customisation Default restrictions within the Android experience Managing dedicated devices, which have always been treated identically to any other consumer Android device on the market, has been a frustrating experience; devices an end user would never use shouldn't need to configure accounts, access Google Play, deal with all the setup wizard interruptions around privacy callouts and more. I'd really hoped the EDLA licence would have solved a lot of problems, but so many years now after its introduction the differentiation is still minimal from MADA. Fortunately it looks like Google are taking another approach. Unfortunately a few years too late for the almost 5 years I supported dedicated devices on a daily basis, but I look forward to future projects benefiting from these changes. What didn't make it # These didn't make it today, but may pop up in a QPR or future Android version release: Dedicated document preview app # In the earlier Android 15 article I referenced a new mandate for OEMs to include a document viewing app, saying: The absence of a document preview application for managed devices has been quite a noisy complaint from organisations for many years, overshadowed only by missing camera &/ gallery applications. None of these apps have been mandated by Google for the fully managed/work profile user experience, and so the common trend is to see them simply not added. It appears Google changed their mind on this, which is not uncommon across releases by any means. The 4 or so years I spent working on Android hardware I saw many instances where proposals ultimately didn't make it - sometimes due to an internal direction change, sometimes pressure from OEMs. Either way it looks like that has happened here also, so we'll go another year without a dedicated document preview app. Skip adding personal accounts during company-owned work profile provisioning # In the earlier article I referenced a change I interpreted as offering the possibility for organisation admins to set provisioning-time configurations that skip the add-account flow during managed provisioning of a company-owned work profile device. This would have been a small quality-of-life improvement that would shorten down the COPE provisioning time for scenarios where either: users don't wish to immediately add a personal account and complete the full setup of their device, or where devices are perhaps staged elsewhere and sent to users registered and ready to go. Alas, we won't see this in 15. With that said, it has been submitted as a feature request to Google! In future, we may see a provisioning time option similar to allow the skipping of personal setup, perhaps palmed off to deferred setup, or triggered on the first boot after provisioning completes. Why would it be useful? Mostly echoing the above - organisations still pre-provision devices, even those on zero-touch, before sending them out to users in an effort to reduce the hand-holding needed for setting up a device. With the COPE model there are privacy and ethical considerations preventing the setup of a personal profile with a user's account, and obviously skipping the account setup renders the setup process less intuitive, even with deferred setup. Ensuring the work side is sorted, then shipping it out to an end user to add their Google account and go I find quite an enticing option in this and similar scenarios. Disallow Thread Network # At the time of writing, Google developer docs still don't have an entry for the Thread API, but reference it in the UserManager docs as an unlinked entity. At some point the link to UserManager should go to the right place. In the meantime it appears the source for CTS contains a test for this API. From that it's somewhat clear what this API is intended for, and we no longer need to assume: // If the device doesn't support Thread then as long as the user restriction doesn't throw an // exception when setting - we can assume it's fine @RequireFeature("android.hardware.thread_network") @RequiresFlagsEnabled(Flags.FLAG_THREAD_USER_RESTRICTION_ENABLED) If that's too ambiguous, the CTS docs reference the hardware feature android.hardware.thread_network, which additional source commits tie directly to Thread network support. It looks like it'll be a relatively straightforward boolean (on/off) restriction allowing managed devices to interface with thread network devices when it's added to Android at a later date. Did I miss anything? # If I did, you know where to find me.
- Android 15: What's new for enterprise?by Jason Bayton on October 31, 2024 at 12:00 am
Android 15 launched officially for Pixel on October 15th. This was about a month and a half after the release to AOSP on September 3rd. It has been a rather odd series of events this year; Pixel typically receives the latest and greatest version of Android in tandem with its release to AOSP, and the marketing and messaging goes out in unison for Android as a whole, but with Pixel's delay it caused something of an anticlimactic debut for AOSP, with most of the Android 15 blogs and announcements only really happening at Pixel's launch. Hopefully that doesn't become the norm, I'm not a fan of delaying announcements until an OEM - Pixel or otherwise - is ready with their own implementation; I can't imagine Google would have done this if Oppo, Samsung, HMD or others asked for the same. That said, here we are. I could have covered this post off for the most-part after the AOSP drop, I chose to wait until Google released their marketing materials. AOSP/developer docs rarely tell the whole story of enterprise support in an Android release, and 15 has been no different; I'd covered pretty much everything I found for AOSP in What's new (so far) for enterprise in Android 15 and so it was the wider Google Play Services and undocumented functionalities that were left to be covered. The below aims to provide a comprehensive overview of enterprise features, so may skip some items mentioned in the blog from April. Feel free to jump back there (link above) for more general Android 15 features. Let's start with a headline feature. Private Space # Android 15 introduces Private Space, the ability for users to protect a selection of apps in a private, additionally-authenticated profile on the device. These applications are isolated - similar to a work profile - from the rest of the applications on the primary parent profile. When Google announced Private Space with 15, I wrongfully anticipated this to be a mostly non-enterprise feature that wouldn't coexist in the management space. After all, it comes across as the work profile for unmanaged devices, in a way (certainly the tech it's built on tells me this). But here we are! The multiple work profiles on one device I've been asking for that Google said they'd never support 😁. Default behaviour for managed devices # The way this is managed is nuanced, per Google: The default value for an unmanaged user is false. For users with a device owner set, the default value is true and the device owner currently cannot change it to false. On organization-owned managed profile devices, the default value is false but the profile owner can change it to true via the parent profile to block creating of private profiles on the personal user. So in other words Private Space is disabled for fully managed devices by default, and cannot be enabled. For work profile-enabled company-owned devices, this can be managed. In testing, my fully managed device does indeed fail to create a Private Space, but doesn't indicate why - it simply fails: An interjection from the DPC to say this isn't possible would tremendously improve the UX. General management policies in the Private Space # If you're concerned the Private Space may become a wild-west of hidden app and user activity, fret not! Policies that have previously applied device-wide, such as the installation of apps from unknown sources, are still device-wide. The Private Space adopts these restrictions with no additional management overhead. Application management in the Private Space # While it's blocked on fully managed devices (which would be a great use case for a reversed COPE, I'll touch on below), it's very much possible to create a Private Space in COPE and co-exist with the work profile. Hang on, you may be thinking, doesn't that just mean users can add apps to a Private Space if they're not permitted to add them to their personal profile? As it turns out, no. Android 15 for business introduces the ability to apply a limited set of security restrictions to specific apps outside the Work Profile. Existing personal app allowlist or blocklist policies can be extended to the new private space feature. In the future, additional privacy preserving security configurations for core apps will be introduced and made backward compatible with Android 15. via The policies applied for permitted or blocked apps in a COPE deployment scenario also apply to the Private Space for AMAPI enrolments. CustomDPC EMMs will gain the same functionality at a later date (no ETA provided by Google). The case for Private Space on fully managed devices # It popped up in the AE Customer Community and I think it's worth further discussion: I quite like the prospect of reversing the existing COPE model to fully manage the device, but have an inaccessible profile (Private Space) for workers. Maximum control of the device with a lower-perceived, but potentially acceptable level of privacy for workers. As indicated for pool/shared devices where you auth, but can pop a few personal apps for break/other reasons the admins can ultimately remove at will.. I like it. Private Space has obviously not been enabled on fully managed devices due to the privacy concerns, I would assume, previously associated with work profiles on fully managed devices. Furthermore, I would expect there are nuances within a fully managed and dedicated use cases (which are mostly shared under the Device Owner (DO) ownership model) that would render this feature incompatible and possibly cause problems. It's also likely a lot of work resurrecting deprecated approaches to cross-profile policies and such that would bring this much closer to pre-11 Android fully managed devices with work profiles.. ..but it could be disabled by default, as it is for fully managed devices, and in organisations that want to allow a reverse-COPE wherein personal apps and data live in a separately encrypted, isolated container with limited cross-profile oversight (personal usage policies would have to apply on fully managed only, just for Private Space), it could work. Supporting this would further add the flexibility organisations want as the personally-owned vs company-owned debate rages on amongst admins. What Private Space isn't # Fort Knox. Unfortunately, and Google to their credit do highlight this, Private Space is still a profile running within Android; the applications installed in this space can be detected with relative ease and so although it makes it extremely difficult to access app data, it doesn't prevent the determined from piecing together a perception of someone based on the apps they're hiding away. Assuming they have access to the device. Giant Private Space icons added in PACKAGE SEARCH for emphasis only. I do feel it could be improved, for example with the work profile implementation there are policies that prevent an app inside the profile from locating applications outside of it, so if I run PACKAGE SEARCH within a work profile, I cannot see the user apps installed in the parent profile. I appreciate this is not 1:1, effectively asking apps in the parent profile to be blocked from running package manager searches on any packages flagged against the Private Space, but I'd like to believe it's possible. So that's Private Space. Next? COPE: Enhancements to company-owned work profiles (COPE) # Google has been busy this year boosting the functionality of the company-owned work profile deployment scenario, and it's a trend I'm here for! Still struggling with the loss of work profiles on fully managed devices, every small bump in functionality that regains some control over the parent (personal) profile of a company-owned device is nothing short of a treat. Here's what's new in Android 15: Control of parent profile screen settings in company-owned work profile deployment scenarios # For company-owned devices running work profile, the following previously fully managed-only restrictions can be applied to devices: Screen off timeout (not to be confused with time to lock, which still supersedes this in terms of hierarchy) Screen brightness (the actual brightness or the screen) Screen brightness mode (manual or automatic) Google announced these as power management controls, I suppose they could contribute to lower power consumption at the cost of user satisfaction if you were to enforce fixed brightness on personal-use devices. They could also contribute to significantly higher power consumption. I'm not sure what use cases were identified here that led to it being framed this way, but I imagine this could be a frustrating experience for knowledge workers if not implemented by organisations appropriately; who could use a device outside on a Summer's day while being limited to 30% brightness? Who would want to check an incoming call or notification in the middle of the night with a screen that doesn't adapt to the ambient conditions of the room, but rather turn on at 100% brightness? In contrast, enforcing automatic would be a sensible default. Be mindful if deploying fixed brightness or brightness modes to personal-use devices. Application defaults in the personal profile for company-owned work profile devices # Extending further control of the personal side of the device for COPE deployments, Google is allowing organisations in Android 15 to set default applications for the dialler, messaging app, and browser. To be absolutely clear, these defaults will be whatever the Android device ships with, so it wouldn't be possible to set Edge as a default in the personal profile across a managed estate. Rather, Samsung may default to Samsung Internet, Pixel to Chrome, etc. This avoids a potential privacy risk in allowing organisations to set their preferred apps as the personal default, complete with whatever identifying information and usage data they may be able to extract from the personal profile and into corporate servers. By implementing these defaults, organisations prevent the opposite scenario where a user may choose to use a non-recommended (or downright potentially harmful app) as their default in the personal profile, and open the device up to additional security risks. Google states these must be initially configured at provisioning time. That is to say set in the policy applied at the time of enrolment. If being set retrospectively, as would be required for any existing device updating to Android 15, this can be done through the use of allowlists: The default messaging app can be set at any time. To enforce OEM defaults for dialler and browser after set up, this control must be combined with an app allowlist. These do not apply to Android 15's Private Space (discussed below), as these applications should not be present in the Space to begin with. Security & privacy changes # Android 15 additionally introduces a fair few security improvements also, some of which include: Migration of events from logcat to SecurityLog # From 15 we'll start seeing more information provided to SecurityLog. For those who've debugged an Android device under management, unless you're working with the device directly, pulling & reviewing logcat can be a pain. As SecurityLog, along with NetworkLog, can be fetched through the EMM, this offers a much simpler option and ongoing review of the respective logs. The intention is to more closely align with NIAP requirements, and allow for quick review of administrative device changes. In addition, Android adds an event for the backup service being toggled by an admin which will also now be available for admins from 15 when pulling security logs. Improvements to Factory Reset Protection # Though there are no enterprise-specific changes to factory reset protection, I believe it's important to highlight some changes made to how it works within the context of an enterprise device, namely: Enabling OEM unlock in developer settings will no longer deactivate FRP Bypassing the setup wizard, which isn't uncommon for dedicated devices/OEMs, will no longer deactivate FRP. Adding accounts, passwords, and applications will no longer be possible while FRP is active Going forward it will be evermore important to ensure both FRP, and enterprise FRP (wherein organisations set the allowlisted Google accounts), are properly maintained and processes correctly followed for resetting devices, if the EMM does not turn FRP off by default (hi, Omnissa..) A bump to minimum SDK version for installation of apps # As expected, the restriction on installing applications targeting very old versions of Android is getting a bump. In Android 15 it will no longer be possible to install apps targeting API level 23 - Android Marshmallow / 6.0 - or older. Only apps that target Android 7.0 - API level 24 - or later will be permitted. jason@MBP Downloads % adb install app-release.apk Performing Streamed Install adb: failed to install app-release.apk: Failure [INSTALL_FAILED_DEPRECATED_SDK_VERSION: App package must target at least SDK version 24, but found 23] Just as last year, we're talking about applications targeting a version of Android 10+ years old. While some organisations with line-of-business apps that haven't seen an update in half a decade may balk at the idea of getting their applications updated or rewritten, the justification behind this limitation is solid - security. Where apps targeting <6.0 were able to abuse the old permissioning system (pre-runtime!), apps targeting 7.0 are still able to abuse device administrator and similar APIs. This isn't something you want potentially leveraged directly or indirectly on your managed estate. Restrictions on device identifiers for personally-owned devices # From Android 15, applications with the permission android.permission.MANAGE_DEVICE_POLICY_CERTIFICATES will be able to fetch getEnrollmentSpecificId, which is an enrolment-specific, unique device identifier that persists across re-enrolments when done so into the same deployment scenario (i.e. fully managed or personally-owned work profile), by the same vendor agent, into the same enterprise (organisation/bind). It is an alternative to identifiers such as IMEI and serial number, which Google no longer grants access to for applications without the appropriate device or profile owner role, or DELEGATION_CERT_INSTALL via policy, and becomes the default and only option for fetching a unique device identifier for personally-owned work profile devices in future. To be clear - applications in a personally-owned work profile deployment up to now with the delegated permission of DELEGATION_CERT_INSTALL have been able to fetch a device serial number with relative ease, something that defeats the entire purpose of restricting access to the identifiers, considered to be personally identifiable information, in the first place. That loophole is closing. Head's up At time of writing there's a bug in 15 - on the Pixel 9 Pro XL at least - preventing delegated scopes from being retrieved by managed apps within the work profile. It works fine in the parent profile. If you'd like to validate this yourself, here's a snippet to call from within an application: val dpm = context.getSystemService(Context.DEVICE_POLICY_SERVICE) as DevicePolicyManager val delegatedScopes = dpm.getDelegatedScopes(null, context.packageName) Security exceptions for sensors-related permissions # From 15, device admins targeting API level 35, including DPCs and device admin role holders, will begin throwing security exceptions when attempting to set permissions for some sensors-specific permissions, including: Manifest.permission.ACCESS_FINE_LOCATION Manifest.permission.ACCESS_BACKGROUND_LOCATION Manifest.permission.ACCESS_COARSE_LOCATION Manifest.permission.CAMERA Manifest.permission.RECORD_AUDIO Manifest.permission.RECORD_BACKGROUND_AUDIO Manifest.permission.ACTIVITY_RECOGNITION Manifest.permission.BODY_SENSORS The two scenarios where this is expected to happen is: The calling agent is a profile owner, rather than a device owner (so work profile deployments, not fully managed) The agent is a device owned on a fully managed device, but has EXTRA_PROVISIONING_GRANT_OPT_OUT set during the provisioning process. While this has been in place since Android 12, previously this would have silently failed. In future security exceptions will be triggered which should make it easier to debug. New restrictions # It wouldn't be an Android release unless we saw a few new features to manage. Here's the run-down: Content protection policy # The content protection policy offers admin control of a new feature for real-time threat detection within the Google Play Protect arsenal of protections covered in a prior security blog from February. For Pixel devices, the toggle for this is in Settings > Security & privacy > More security & privacy > Scanning for deceptive apps. It is buried deep in Settings. When the configuration is unspecified, currently the respective toggle is off for fully managed devices. Switching to enforced then enables the setting. This is a great approach, sympathetic to the feedback its announcement generated from administrators already frustrated with overbearing Google Play Protect policies that cannot be disabled (full disclosure, I'm generally in favour of GPP, but I'm aware of the problems it causes for some organisations), while allowing its use for organisations that feel they need it. For EMM vendors, this is already present in AMAPI as contentProtectionPolicy under AdvancedSecurityOverrides. Android 15 also introduces the permission android.permission.MANAGE_DEVICE_POLICY_CONTENT_PROTECTION for apps which are not the device or profile owner to be able to interface with this API. Google Play Protect app scanning changes # In a related note, in September 2024 Google made a considerable change that will placate any organisation deploying sideloaded enterprise applications, including those installed via the EMM DPC (agent), internal services, or sideloaded in more traditional ways. These applications will no longer be sent to Google for scanning, and no longer prompt end users to take any action against them unless they are known to Google to be potentially harmful. More information here. Disallow NFC radio # As it says on the tin. If you're thinking "Don't we already have an API for NFC?" Yes we do, but that's to control the beaming of data between devices. This is a full on radio disable and will probably live under DeviceRadioState in AMAPI at some point later. This appears to be a natural progression from the earlier DISALLOW_CHANGE_NEAR_FIELD_COMMUNICATION_RADIO which prevents the turning on/off NFC in settings. eSIM management # eSIM has been given a respectable amount of attention in 15. Here's what's new: Disallow SIM Globally # The API I found earlier in the year appears to be a subset of a larger eSIM management framework being introduced with Android 15. For completeness, as the earlier post was quite light, here's what Disallow SIM Globally actually means: Available for both fully managed and company-owned work profile devices, disallow SIM globally (DISALLOW_SIM_GLOBALLY) is an eSIM restriction to globally prevent the user download of eSIMs to a device. While I earlier assumed it may have been globally disabling cellular, killing the radio and hiding the respective settings, status bar messaging, and so forth (useful particularly for lower-cost tablets that often come with cellular) this is not the case. In my testing, with the restriction enabled I was able to go into settings, begin eSIM setup with the scan of a QR code, and only then did it prevent setup with a generic error message that suggests there's a problem with the eSIM rather than a policy restriction in place: The experience could be improved dramatically here just with the addition of management UI, and preferably earlier in the process of adding an eSIM, also. Expanding 9.0 APIs for eSIM management # More broadly Android 15 introduces eSIM configuration capabilities via EMM. Based on what I've been able to find, eSIM management is directly associated with eSIM subscription management introduced in Android 9.0, and has been expanded in 15 to allow remote configuration via EMM, or the appropriate permission: Starting from Android Build.VERSION_CODES.VANILLA_ICE_CREAM, if the caller has the android.Manifest.permission#MANAGE_DEVICE_POLICY_MANAGED_SUBSCRIPTIONS permission or is a profile owner or device owner, then the downloaded subscription will be managed by that caller. In case the caller is device owner or profile owner of an organization-owned device, switchAfterDownload can be set to true to automatically enable the subscription after download. If the caller is a profile owner on non organization owned device switchAfterDownload should be false otherwise the operation will fail with EMBEDDED_SUBSCRIPTION_RESULT_ERROR. It would appear EMM vendors with either custom DPCs or via AMAPI will be able to lean into this API from 15 to add and remove EUICC subscriptions. Neat. Further, it will even support partial payloads! Providing the device has already been registered with an eSIM on a carrier's SMDP+ server, it will allow the device to reach out to that server, declare itself and get it's eSIM. This has the potential to significantly simplify eSIM management, reducing the number of eSIM configurations necessary for large deployments. Personally-owned device users will be able to remove the configured eSIM, though for company-owned devices, the additional policy DISALLOW_CONFIG_MOBILE_NETWORKS can be set to ensure eSIMs aren't deleted. Disallow assist content # This restriction allows administrators to prevent privileged apps, such as Assistant, from receiving contextual device information. These include screenshots, package names, and more. Useful for admins wishing to reduce the sprawl of information access privileged apps can have. This is scope-specific, so on fully managed devices will apply device-wide, but on profile-enabled devices restricts only to the managed profile. Circle to search # Relatively straightforward, an enterprise API is being introduced to lock down circle to search - one of the most hyped up features I've seen in a long time.. but probably not something organisations want accidentally invoking on dedicated devices while customers try to order a Big Mac! This is a nice continuation of assist content above, limiting the amount of data being sent to Google services. Widget management is back?! # With Android 15, setKeyguardDisabledFeatures has been expanded with widget management to coincide with the re-introduction of lockscreen widgets for tablet devices. At this time it appears to only apply to widgets in managed profiles, with Google explicitly stating: ..the profile owner of an organization-owned managed profile can set KEYGUARD_DISABLE_WIDGETS_ALL which affects the parent user when called on the parent profile. More testing is needed to determine why this isn't available for fully managed devices. To note for wider context, lock screen widgets were removed way back in 5.0 citing, if I remember correctly, low use. With the recent focus on tablets, and Apple adding their own, Google clearly figured they matter again! Other changes and requirements for 15 # Rounding off what's new, here are some additional features that don't fit into the above categories: Platform signed permission management # When a vendor works with an OEM to get their application platform singed, the application is granted all system-level permissions available on the device. As you can imagine, that is an unprecedented level of device access to data and services reserved normally for only the OEM system apps, and Google's preloaded suite of applications. In Android 15, Google is introducing system permission management, allowing OEMs to grant or deny permissions to signed applications that allows for the considerable down-scoping of access of a signed app to only the explicit permissions required to function. This won't apply to system apps bundled with a set of permissions in the OEM system image, but should permissions change in a later system app update, these permissions would also be denied automatically unless allowlisted in the respective system configuration. There's an additional config to allow platform-signed shared UIDs for non-system applications that have additionally previously required access to this. There are new alerts in logging to determine the permissions applications are no longer retaining access to, which vendors should already start looking at today to avoid loss of functionality. Knowing how many enterprise vendors lean on platform signature permissions today (basically most EMMs, several SaaS products, etc), this has the potential to cause headaches as 15 lands on devices, unless OEMs and vendors work together proactively to avoid this. Screen recording improvements # If you're like me and record your screen far too often to demonstrate anything from a device feature to a bug, user guides and more, you'll be pleased to hear the previously Pixel-only feature introduced in Android 14 is coming to the wider ecosystem with the 15 update. Now users can limit screen sharing to just the app they want to show, and no longer fret on the possibility to showing something that may not be appropriate for the context. Continuing the theme of recording, this is not so much an enterprise feature in and of itself explicitly, but Android 15 will alert apps when the screen is being recorded, allowing them to hide contents. I can imagine this might be useful for enterprise applications across the board to bolster DLP (data loss prevention), and based on murmurings in Tech News, Google is testing restrictions in Chrome to prevent sensitive information from being recorded (addresses, card details, passwords, etc). Broader system update visibility # From 15, applications granted the permission android.permission.MANAGE_DEVICE_POLICY_QUERY_SYSTEM_UPDATES will be able to obtain information about a pending system update. This softens the current requirements that an application be a device or profile owner in order to fetch this information. What this doesn't do, unfortunately, is offer any more information about the update(s) available. Today we can see an update is available and that it's a security update. This API needs to be updated to show - build info, size, how long it's been available (not just when first detected), - SPL/Android version All of this is offered either through GOTA, Google's OTA management server many OEMs are encouraged to leverage (some don't of course, consider e-FOTA from Samsung, or HMD's new FOTA platform), or the build fingerprint of the package itself. Check MTE status # Expanding on the options for getting and setting MTE policies in Android 14, in 15 it will now be possible to merely query the current state (evidently something that should have, but didn't, quite make it to the 14 release!) Deeper dedicated device experience management # With Better Together Enterprise, AKA the new customer signup flow, Google is introducing a new provisioning option for dedicated devices, in addition to PERSONAL_USAGE_ALLOWED and PERSONAL_USAGE_DISALLOWED, Google are introducing a third allowPersonalUsage AMAPI enrolment token configuration option of DEDICATED_DEVICE. That alone isn't an Android 15 feature, but an accompanying flag OEMs can set from 15 within the device software declaring it a dedicated device should give many dedicated device-based organisations a reason to take note. Such distinguishing features between knowledge worker devices and the new dedicated devices flag include: Setup Wizard customisation Default restrictions within the Android experience Managing dedicated devices, which have always been treated identically to any other consumer Android device on the market, has been a frustrating experience; devices an end user would never use shouldn't need to configure accounts, access Google Play, deal with all the setup wizard interruptions around privacy callouts and more. I'd really hoped the EDLA licence would have solved a lot of problems, but so many years now after its introduction the differentiation is still minimal from MADA. Fortunately it looks like Google are taking another approach. Unfortunately a few years too late for the almost 5 years I supported dedicated devices on a daily basis, but I look forward to future projects benefiting from these changes. What didn't make it # These didn't make it today, but may pop up in a QPR or future Android version release: Dedicated document preview app # In the earlier Android 15 article I referenced a new mandate for OEMs to include a document viewing app, saying: The absence of a document preview application for managed devices has been quite a noisy complaint from organisations for many years, overshadowed only by missing camera &/ gallery applications. None of these apps have been mandated by Google for the fully managed/work profile user experience, and so the common trend is to see them simply not added. It appears Google changed their mind on this, which is not uncommon across releases by any means. The 4 or so years I spent working on Android hardware I saw many instances where proposals ultimately didn't make it - sometimes due to an internal direction change, sometimes pressure from OEMs. Either way it looks like that has happened here also, so we'll go another year without a dedicated document preview app. Skip adding personal accounts during company-owned work profile provisioning # In the earlier article I referenced a change I interpreted as offering the possibility for organisation admins to set provisioning-time configurations that skip the add-account flow during managed provisioning of a company-owned work profile device. This would have been a small quality-of-life improvement that would shorten down the COPE provisioning time for scenarios where either: users don't wish to immediately add a personal account and complete the full setup of their device, or where devices are perhaps staged elsewhere and sent to users registered and ready to go. Alas, we won't see this in 15. With that said, it has been submitted as a feature request to Google! In future, we may see a provisioning time option similar to allow the skipping of personal setup, perhaps palmed off to deferred setup, or triggered on the first boot after provisioning completes. Why would it be useful? Mostly echoing the above - organisations still pre-provision devices, even those on zero-touch, before sending them out to users in an effort to reduce the hand-holding needed for setting up a device. With the COPE model there are privacy and ethical considerations preventing the setup of a personal profile with a user's account, and obviously skipping the account setup renders the setup process less intuitive, even with deferred setup. Ensuring the work side is sorted, then shipping it out to an end user to add their Google account and go I find quite an enticing option in this and similar scenarios. Disallow Thread Network # At the time of writing, Google developer docs still don't have an entry for the Thread API, but reference it in the UserManager docs as an unlinked entity. At some point the link to UserManager should go to the right place. In the meantime it appears the source for CTS contains a test for this API. From that it's somewhat clear what this API is intended for, and we no longer need to assume: // If the device doesn't support Thread then as long as the user restriction doesn't throw an // exception when setting - we can assume it's fine @RequireFeature("android.hardware.thread_network") @RequiresFlagsEnabled(Flags.FLAG_THREAD_USER_RESTRICTION_ENABLED) If that's too ambiguous, the CTS docs reference the hardware feature android.hardware.thread_network, which additional source commits tie directly to Thread network support. It looks like it'll be a relatively straightforward boolean (on/off) restriction allowing managed devices to interface with thread network devices when it's added to Android at a later date. Did I miss anything? # If I did, you know where to find me.
- How Goto's acquisition of Miradore is eroding a once-promising MDM solutionby Jason Bayton on September 24, 2024 at 12:00 am
Back in 2014, I discovered Miradore, an ITSM solution with a then-emerging Mobile Device Management (MDM) product that promised a robust set of features for managing Android devices. My initial review, Miradore Online: Free MDM, highlighted the platform's potential and its generous free tier, which made it stand out in a market otherwise dominated by costly alternatives. Miradore isn't defined by their free tier, of course, there's a rather large and feature-rich product behind it. It's what drew me in to their product in the first place however, and has been a consistent, defining feature of their platform for more than a decade. Over the years, I revisited Miradore multiple times, documenting its growth and the expansion of its feature set in articles like Miradore Online MDM Review: A Second Look and Miradore Online MDM: Expanding Management with Subscriptions. In 2022, when Miradore announced its acquisition by Goto, I met the news with cautious optimism. Goto, a company known for its suite of remote work tools, seemed like a reasonably safe choice to nurture Miradore's growth. Official announcements from both parties, such as Goto Acquires Miradore and Miradore Acquired by Goto: What Happens Next?, painted a rosy picture of enhanced resources and expanded capabilities. However, the honeymoon period is certainly over now. Since the acquisition, Goto has more and more shown its disdain for Miradore's core MDM USP, systematically stripping away key features from the free tier and fundamentally altering the product's value proposition and accessibility. The erosion of the free tier # Last December, a significant change came when Goto removed essential functionalities from the free plan. Email configuration, VPN setup, Wi-Fi settings, contacts management, and mail were no longer accessible without a paid subscription. Details of these changes weren't outlined in Miradore's release notes, instead opting to send direct emails to certain customers only. I personally heard about it second-hand. Nevertheless, the impact was felt by long-time users who had integrated these features into their device management workflows. The situation worsened then in April; Goto further restricted the free tier by limiting mass actions — a cornerstone feature for any MDM solution. According to the official announcement: We have modified our Free plan and limited the mass actions. From now on, Free plan customers can: Deploy configuration profiles one device at a time Synchronize a single device at a time These changes effectively crippled the efficiency that Miradore once offered. Administrators now have to perform repetitive tasks individually for each device, a tedious process that is impractical for organisations managing more than a handful of devices. But Goto isn't finished. Later this year, they have announced plans to cap the number of devices on the free plan to 50, down from unlimited. The forthcoming changes were communicated through another release note recently. Yes, effectively unlimited devices down to 50. They aren't adjusting the tier functionality either, so it remains quite limited in capability after this change also. The impact on organisations # Obviously paying customers on higher tiers are wholly unaffected by these changes, and the remaining Miradore team within Goto continue to do a wonderful job with their customer base. That said, many of the paying customers they have will have come in through their free tier, often selected because organisations could get started and grow their estates without a licence commitment. These cumulative changes have made Miradore's free tier not just limited but virtually unusable for organisations of any moderate size and/or complexity, and pit Miradore far more directly with competing platforms, such as Manage Engine's 25 free licences. Fewer, yes, but not feature-limited. If you're going to enforce limits, you'd be wise typically to pick a path - limited licences, or limited functionality. The removal of both critical features and the imposition of device limits is a double-whammy that offers the worst of both worlds. I'd ask how they expect groups on the free tier to remain loyal to a platform driven by decisions that scream "we don't want you here", but it seems apparent they haven't considered the question. As someone who has championed Miradore for nearly a decade, I find this trajectory disheartening. The platform's Unique Selling Proposition (USP) was its robust free tier, which allowed organisations — especially smaller groups and communities with tight budgets — to manage their Android devices effectively without incurring additional costs, and I have directed hobbyists, charities, and indeed potential customers their way for years to benefit from this in order to take a first step into the enterprise management ecosystem. Goto's strategy appears to be undermining this USP entirely. By going down the path they've chosen, they're alienating the very user base that helped Miradore grow. It's a puzzling move, especially when considering that the MDM market is more competitive than ever, and my sympathies go out to the remaining Miradore team suffering the consequences of these mandates. Conclusion # Miradore's journey from a promising entry point into device management to its current state of limited functionality on a finite number of devices is a cautionary tale of how acquisitions can sometimes erode the very qualities that gave a product its place in a market. Goto's incremental worsening of their product will fundamentally change what Miradore offers, making it less appealing to organisations that may have used it as a jumping point into a higher tier at a later date, and more likely to be bundled with competing platforms in the decision-making process, unfortunately some with more compelling trial / free tiers than Miradore will soon offer. My hope going forward is these changes derive very real, measurable impacts on user acquisition and retention, and force Goto to revert. Better still if they also then choose to step back and let the folks who built and know the product define how it should be positioned and operated in the market going forward.

Brooks Peppin's Blog Managing Windows in the Modern Workplace
- How to Create a no-prompt bootable WinPE ISO – Crowdstrike Fixby Brooks Peppin on July 20, 2024 at 8:33 pm
With the massive Crowdstrike outage this week, we looked for a way to automate fixing virtual machines in our environment. Since our VMs were not ... Read more
- A Beginners Guide to Azure AD Join – Everything you Need to Knowby Brooks Peppin on April 26, 2023 at 6:58 pm
Welcome to the beginner’s guide to Azure AD join! As businesses increasingly rely on cloud-based solutions, Azure Active Directory has become an essential tool for ... Read more
- Understanding Windows Feature Updates in Microsoft Intuneby Brooks Peppin on December 19, 2022 at 10:07 pm
Deploying Windows 10/11 feature updates with Microsoft Intune is much simpler than traditional methods. You no longer have to “push” out the full patch or ... Read more
- Intune vs. Workspace ONE: 15 Pros and Cons (2022 Edition)by Brooks Peppin on October 17, 2022 at 4:53 pm
Microsoft Intune and VMware Workspace ONE are both industry-leading Unified Endpoint Management (UEM) solutions. If you look at any Gartner Magic Quadrant chart from the ... Read more
- How to Fix Hybrid Azure AD Join Error 0x801c005b: error_computer_signature_check_failureby Brooks Peppin on September 30, 2022 at 12:34 am
Seeing error 0x801c005b alongside error_computer_signature_check_failure when attempting to Hybrid Azure AD join your Windows devices? This error will prevent the hybrid join process from completing. ... Read more

Many Miles Away Helping you succeed with end user computing technologies
- Implementing Workspace ONE Relay Server Cloud Connectors (RSCC) with an existing Pull Relay...by Darryl Miles on June 1, 2024 at 2:09 am
The Workspace ONE UEM Relay Server Cloud Connector (RSCC) is a hybrid solution that pulls content (products only) from a … More
- Setting up a Workspace ONE UEM Relay Server for Android Rugged devicesby Darryl Miles on May 24, 2024 at 3:38 am
A Workspace ONE relay server acts as a middleman in distributing content within a Workspace ONE UEM environment to Android … More
- Enabling Advanced Device Telemetry for mobile devices through Workspace ONE Intelligence SDKby Darryl Miles on May 16, 2024 at 11:07 am
Spotting what’s causing a bad experience for mobile workers starts with a deep dive into device problems. The latest Workspace … More
- Enabling Shared Device Mode (SDM) for Microsoft Entra ID Conditional Access Policiesby Darryl Miles on April 30, 2024 at 12:17 am
In August 2023, Workspace ONE UEM extended conditional access capabilities for Microsoft Entra ID (formerly Microsoft Azure Active Directory) with … More
- How to deploy macOS PaperCut using Workspace ONEby Darryl Miles on April 14, 2024 at 2:46 am
PaperCut is used by businesses and organizations to track, control, and optimize their printing. PaperCut MF allows businesses to set … More

Sam Akroyd. Thoughts on Tech
- Can WiLo enable IoT-based Smart Cities?by Sam Akroyd on October 14, 2024 at 2:11 pm
I’ve spent the last few months building my own Smart Home, but we all know residential tech often…
- Home Assistant: We’ve done Smart Home, what about Smart Garden?by Sam Akroyd on September 25, 2024 at 12:11 pm
If you’ve been following the various episodes on building a Smart Home, you’ll know we’ve managed to make…
- Home Assistant: HACSby Sam Akroyd on September 10, 2024 at 10:54 am
You will have seen me reference HACS in a number of my blogs in the past few months.…
- Solar & Batteries in Home Assistantby Sam Akroyd on September 2, 2024 at 8:50 am
Solar panels, batteries and EVs are some of the fastest growing markets worldwide as the green revolution grips…
- Frigate, Home Assistant and AIby Sam Akroyd on July 23, 2024 at 8:34 am
So if you’ve seen the first blog on Frigate NVR and Home Assistant, and you’ve followed along –…

- Workspace ONE UEM Sensors and custom Registry valuesby techhub981158167 on June 10, 2024 at 12:58 pm
I had a customer enquiry recently where they were looking to pull some custom fields from a device to identify a device location, well at least where it was deployed, as well as come custom tags and other information they associate with a device at the time of deployment. If you have used Workspace ONE … Continue reading Workspace ONE UEM Sensors and custom Registry values →
- VMware App Volumes Apps on Demandby techhub981158167 on January 8, 2024 at 3:26 pm
There are plenty of articles explaining what VMware App Volumes Apps on Demand are and the benefits, for example https://www.vmware.com/uk/topics/glossary/content/apps-on-demand.html. This video demonstrates how quick and east it is to associate an App Volumes Server with an RDS Host in VMware Horizon and subsequently deliver a package using Apps on Demand.
- End of Yearby techhub981158167 on December 20, 2023 at 10:14 am
When I started this blog and YouTube channel a few years back I never really had a target other than to share any tips, tricks, information and how to for various EUC products. It’s always nice to see the end of year stats and know that people are looking at your content. Diving into the … Continue reading End of Year →
- The next phase of Workspace ONE UEM Sensorsby techhub981158167 on December 8, 2023 at 11:14 am
Earlier this year I wrote a blog article about using ChatGPT to write PowerShell scripts that could be used in Workspace ONE UEM to create Sensors. This works fine, but bear in mind that ChatGPT created PowerShell scripts for me based on best endeavours, there is no guarantee they would work or would not contain … Continue reading The next phase of Workspace ONE UEM Sensors →
- Workspace ONE UEM and Windows Multi Userby techhub981158167 on August 23, 2023 at 3:48 pm
Multi User or Shared Device, if you want to look at it that way, is something that has been supported with VMware Workspace ONE UEM but more so for Mobile Operating Systems rather than Windows. VMware has received feedback from several customers on wanting to be able to support a Windows Multi User use case. … Continue reading Workspace ONE UEM and Windows Multi User →

Thomas Cheng Welcome to my digital home!
- Proofpoint Certified Insider Threat Specialist Course 3 – A Day in the Life of an Insider Threat...by techiecheng on March 29, 2023 at 8:38 pm
Proofpoint recently released a three-part training webinar on identifying and mitigating insider threats. By viewing and taking the exam after all the sessions, Proofpoint will award you with a certificate. This post will recap what I learned in course 3 of this series.
- Proofpoint Certified Insider Threat Specialist Course 2: Building a Successful Insider Threat...by techiecheng on March 29, 2023 at 6:59 pm
Proofpoint recently released a three-part training webinar on identifying and mitigating insider threats. By viewing and taking the exam after all the sessions, Proofpoint will award you with a certificate. This post will recap what I learned in course 2 of this series.
- Proofpoint Certified Insider Threat Specialist Course 1 – Getting Started with Insider Threatsby techiecheng on March 26, 2023 at 4:47 am
Proofpoint recently released a three-part training webinar on identifying and mitigating insider threats. By viewing and taking the exam after all the sessions, Proofpoint will award you with a certificate. This post will recap what I learned in course 1 of this series.
- ‘Invalid credentials. Try again.’ when signing onto Workspace ONE UEM console with Active...by techiecheng on September 23, 2022 at 4:00 pm
Awhile back, I wrote a post on the error when signing into UEM with my AD credential. “Please contact Administrator” when signing onto Workspace ONE UEM console version with Active Directory credential Today, I got a different error when signing in with my AD credential to our shared SaaS/sandbox CN135: ‘Invalid credentials. Try again.’ I
- The true beauty of the Apple Beta Software Programby techiecheng on June 6, 2022 at 4:00 pm
Throughout the years, I’ve written many blog posts related to iOS update. Prevent users from installing iOS beta software in VMware Workspace ONE UEM by AirWatch Managing iOS update with Workspace ONE UEM Schedule iOS Update with VMware AirWatch Stop iOS update on its track with VMware AirWatch iOS 12.2 is here and how it

VirtuallyUnboxed Lifting the lid on everything virtual
- End of support for vSphere 6.5.x and 6.7.xby virtuallyunboxed on October 20, 2022 at 4:31 pm
In case you missed it, last week marked the end of general support for vSphere 6.5 and 6.7. This is the same regardless of whether you were using it for data centre services or EUC services like Horizon.
- Desktop Repurposing v4by virtuallyunboxed on October 20, 2022 at 4:23 pm
This year, myself and Matt Evans joined forced again, along with newcomer, Jonathan D'arcy to review some of the best desktop repurposing tools on the market. As with previous years we reviewed imaging and performance. However, this year we also took a look at the accompanying management solutions.
- VMware SASE and Cloud Web Securityby virtuallyunboxed on January 22, 2022 at 3:11 pm
Let's start with the basics! SASE is a Gartner term and is an abreviation of Secure Access Service Edge. Still not much help right? Well lets start explaining this by looking at how people typically work, espeically remotely, and how their traffic is secured. Most of you that ever work remotely will most likely use a device level VPN. This uses software on your device to create a tunnel into your company data centre and allows you to remotely access internal resources. This is how most companies have done it for many years, and it really dates back to the days when all a companies resources were in their own data centre. Tunnelling all the traffic back into the data centre was the perfect way to reach everything a remote user would need.
- Workspace ONE UEM and Workspace ONE Access Integration for Hub Servicesby virtuallyunboxed on March 2, 2021 at 4:06 pm
I know there are a lot of SaaS customers out there who have only been using basic MDM functionality within Workspace ONE. The platform has moved on a lot in the last few years and if you haven't already seen it i strongly suggest you check out hub services. This takes the Workspace ONE agent that is used for device management and adds additional functionality to the application such as a unified app catalogue, people search and a notifications platform to name but a few!
- Workspace ONE Access FIDO2 integrationby virtuallyunboxed on February 19, 2021 at 2:33 pm
As of this month (Feb 2021) All Workspace ONE Access SaaS tenants, now supports FIDO2 as an authentication method. So, I thought i'd put together a short video showing how easy it is to configure it and some different device types using the solution.

Mobile Jon's Blog My WordPress Blog
- Deep Dive into Windows 11 Kiosks Part 2: Advancedby MobileJon on January 28, 2025 at 4:32 am
The article discusses Windows 11 Kiosks, focusing on Shell Launcher and Restricted User Experience. It explains how to build and deploy XML configurations for both features using Microsoft Intune. Shell Launcher allows custom UIs, while Restricted User Experience manages multiple apps in a kiosk-like environment. The content highlights practical applications and deployment tips.
- Deep Dive into Windows 11 Kiosks Part 1: Assigned Accessby MobileJon on January 15, 2025 at 8:11 pm
This article discusses Windows 11's Assigned Access feature for kiosk management. It outlines various kiosk types, such as Assigned Access and Shell Launcher, along with their deployment via XML in Intune. The article emphasizes the advantages of Assigned Access and the user experience it offers.
- Using Intune Remediations to Rename Windows Devicesby MobileJon on January 9, 2025 at 3:59 am
The article discusses enhancing the efficiency of computer renaming within Intune through new scripts, as existing methods are slow and cumbersome. It details challenges with naming conventions, particularly for hybrid-joined devices, and presents detection and remediation scripts for improving the renaming process and ensuring compliance.
- Intune Device Query Part One: KQL or KQ-Hell?by MobileJon on December 18, 2024 at 5:47 pm
Today we discuss Microsoft’s Intune Device Query, detailing its functionality and requirements. It introduces Kusto Query Language (KQL), explaining its purpose in data querying. Key components of KQL like table operators, scalar operators, and aggregation functions are highlighted. Limitations of Device Query and suggestions for improvement are also mentioned.
- Introducing Intune Device Inventoryby MobileJon on December 13, 2024 at 2:54 am
The new Intune Device Inventory feature aims to enhance analytical insights into devices, addressing critical questions about device specifications and support. Key components include the Microsoft Device Inventory Agent and the creation of a Properties Catalog Profile. While promising, the feature requires further development to fully integrate with dynamic groups and Microsoft Copilot.
VMware Workspace ONE The un-official subreddit for VMware Workspace ONE. I recently started learning/managing Workspace One for the company I work for, I came to reddit to find others and saw that there wasn’t a community, so I started one. Our discord is here https://discord.gg/Zhr3TqMMf6
- Help please : constantly getting "failed install URL"by /u/GrimreaperIRL2017 on February 3, 2025 at 12:21 pm
2 devices Samsung Fold 6 and S25Ultra both getting same error . Anyone have any advice on this on ? submitted by /u/GrimreaperIRL2017 [link] [comments]
- Unable to install/push APK internal app and updates through isolated network on my Android fleetby /u/Choucapic on February 3, 2025 at 11:18 am
Hello there ! I stumbled upon a rather an irritating problem with my Android fleet 😫 After a security audit, it has been established to close all the network ports from my fleet except TCP443 & TCP2001 to WS1 and TCP443 to my business web servers, Iron Curtain style. Everything seems good, I can enroll and delete devices, I can ping/see updated data, receive geolocation data, ... BUT, it is impossible for the device to receive any internal APK app/update either by pushing it from WS1 or asking it via the Hub Application on the device. When I connect the devices on my personnal WIFI or public 4G, everything works (That's what I do when enrolling them). The device receives the download request, tries to download and fail and retries indefinitely. After reviewing the logs, it seems WS1 (or Android/device policy ?) try the network and bandwith of the device before initiating the download. I suspect that the device tries to ping/access a public IP to achieve that (And I find this very sad in order to download an internal app directly provided by WS1 ...) Unfortunately, the logs don't show the IP/DNS at all, and after creating a ticket to VMWARE, they only redirect me to their VMWARE Ports and Protocols with hundreds of mixed ports ... And I'm not very fond of going with Trial&Error on every port listed with my Security Team😅 I see these two rules that could apply but I would prefer to be sure before asking my really frigid Security Team (and pledging a limb/organ over it) 🥶 : https://preview.redd.it/gh4am8wypwge1.png?width=1575&format=png&auto=webp&s=398e277fb5d8c78e2414d5b5bf88d1c11cc2d40c Here is an example of the error in the device's logs : 1738144666558|E|InstallApplicationHandler|Not a known network connection type||java.lang.IllegalStateException: No internet connectiion to sample usage at com.airwatch.datasampling.AppDataSamplerFactory.getSampler(SourceFile:40) at com.airwatch.agent.command.chain.InstallApplicationHandler.updateBaseDataUsage(SourceFile:138) at com.airwatch.agent.command.chain.InstallApplicationHandler.installApplication(SourceFile:126) at com.airwatch.agent.command.chain.InstallApplicationHandler.execute(SourceFile:68) at com.airwatch.bizlib.command.chain.CommandHandler.next(Unknown Source:6) at com.airwatch.bizlib.command.chain.ProfileCommandHandler.execute(SourceFile:70) at com.airwatch.bizlib.command.chain.CommandHandler.next(Unknown Source:6) at com.airwatch.agent.command.chain.LockHandler.execute(SourceFile:37) at com.airwatch.bizlib.command.chain.CommandProcessor.execute(Unknown Source:2) at com.airwatch.agent.command.AgentCommandProcessor.execute(SourceFile:56) at com.airwatch.bizlib.command.CommandSendThread.processCommands(Unknown Source:43) at com.airwatch.agent.command.AgentCommandSendThread.processCommands(SourceFile:277) at com.airwatch.agent.command.AgentCommandSendThread.processCommands(SourceFile:264) at com.airwatch.agent.command.AgentCommandSendThread.run(SourceFile:173) at com.airwatch.agent.scheduler.task.CheckForCommandTask.checkForCommands(SourceFile:87) at com.airwatch.agent.scheduler.task.CheckForCommandTask.processImpl(SourceFile:67) at com.airwatch.agent.scheduler.task.Task$1.run(SourceFile:100) at java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:457) at java.util.concurrent.FutureTask.run(FutureTask.java:266) at android.os.Handler.handleCallback(Handler.java:790) at android.os.Handler.dispatchMessage(Handler.java:99) at android.os.Looper.loop(Looper.java:164) at android.os.HandlerThread.run(HandlerThread.java:65) Do somebody already had the same problem or has any clue on the matter ? Feel free to ask if something needs clarification or further details. Have a nice day y'all and happy enrolling ! 🤠 submitted by /u/Choucapic [link] [comments]
- Omnissa Access and 3rd party integration possibilitiesby /u/PepperSad5780 on February 3, 2025 at 7:26 am
Does anyone have a proper reasoning why Omnissa Access is not giving the option to forward login events to a 3rd Party security solution? All the IdP's out there are having this option and I am wondering why Omnissa is kind of reluctant of implementing this. Keeping Omnissa Intelligence in mind I get even more upset about this, since Access allows the integration with the "own" products. Means the API is there and ready to use but not for 3rd party. Anyone is having a solution for this? Or at least a reasoning why this is not possible? submitted by /u/PepperSad5780 [link] [comments]
- Workspace ONE (Omnissa) Boxer 403 Sync Error + SEG-DS Communication Failure After Certificate Changeby /u/Acrobatic-Jelly-5525 on February 2, 2025 at 2:32 pm
I’m stuck with a critical Workspace ONE/Boxer issue after updating server certificates. Hoping someone can help! Issue: - Users get “Unable to Sync – Error 403”** when logging into Boxer via Workspace ONE. - Logs show “Seg cannot communicate with DS”(Secure Email Gateway failing to talk to Directory Services). Background: - Environment: Workspace ONE UEM (On-Prem?), Boxer for email, Active Directory, and SEG for email security. - Trigger: Recently renewed/changed SSL certificates on the server (likely impacting SEG/DS trust). What I’ve Tried: 1. Validated new certificates on email server (Exchange) and SEG (correct SANs/CN, chain trust). 2. Pushed updated certificates to devices via Workspace ONE. 3. Confirmed SEG service is running and tested LDAPS connectivity to AD (ports 636/3269 open). 4. Reviewed logs: SSL handshake errors and SEG-DS communication failures persist. submitted by /u/Acrobatic-Jelly-5525 [link] [comments]
- Mac Mini Out-of-Box Setup – Bypassing Keyboard/Mouse Requirement?by /u/refunded_flatulence on January 31, 2025 at 7:04 pm
We have several brand-new Mac mini devices that are set to enroll into our MDM via Apple Business Manager (ABM). However, they are halting on startup, requiring a keyboard and mouse to be connected before continuing with setup. Once we plug in a keyboard and mouse and proceed past that initial setup screen, automatic enrollment kicks off successfully, running our scripts and completing the setup as expected. My question is: Is there any way to bypass the need for a keyboard and mouse on out-of-the-box setup? We have a few hundred of these devices to deploy, so we're looking for ways to streamline the process and eliminate extra steps for our techs. We had assumed that simply powering on the devices and plugging them into a network connection would be enough for them to check in with ABM and start the enrollment automatically. Has anyone found a way to work around this requirement? Any suggestions or best practices would be greatly appreciated! submitted by /u/refunded_flatulence [link] [comments]
- App Policies Workspace One Boxer iOSby /u/Early_Bullfrog88 on January 29, 2025 at 1:13 pm
Hi guys, I have a problem with the App Policies in the Workspace One Boxer App on iOS. The configuration of the app states that files from Boxer may only be shared with certain other apps. On the one hand, I have stored the Workspace One Content App and the Nextcloud App. If I now share a PDF with Nextcloud, “Controlled” is set before the actual file name. I can save the file, but the file is empty when I open it. I also have this behavior with all other apps that are not included in the allowed list. If I share the file with the Content app, the PDF is saved without the “Controlled” prefix and I can then open the file in Content without any problems. Does anyone have any idea what the problem could be? I have also tested other apps with the same problem as with Nextcloud. Thank you very much! submitted by /u/Early_Bullfrog88 [link] [comments]
- Windows App Installation Issues After Enrollment – Stuck in 'Queued' Stateby /u/Little_Departure1229 on January 29, 2025 at 7:23 am
Hello, I am experiencing major issues with installing Windows applications in our on-prem installation. During the initial setup of devices using an admin account and enrolling them with a local user, all apps install without any problems. However, when the user account (non-admin) is later set up on the device, and we attempt to deploy a new version of an application after some time, the process remains in the "queued" state, and no application gets installed on the endpoint. Sometimes, the installation can be triggered by logging in again with the admin account that was used for enrollment. What could be the reason why applications are not being installed? Windows Update? Are installations tied to a specific user (the Windows account used for enrollment)? Note: We enroll all devices in Workspace ONE using the same local user. Greeting Nicklas https://preview.redd.it/srn43q2wwvfe1.jpg?width=937&format=pjpg&auto=webp&s=b73f53c702145a0d9484a2f2e68a4e7bb7ed4649 https://preview.redd.it/11lz6q2wwvfe1.jpg?width=804&format=pjpg&auto=webp&s=c861689a19046f294b5f97b483f899cbef941dbb https://preview.redd.it/t8ctgr2wwvfe1.jpg?width=978&format=pjpg&auto=webp&s=ea19d905757ff3dc1160b987e1591b8d507e32a4 https://preview.redd.it/tdlwjr2wwvfe1.jpg?width=1187&format=pjpg&auto=webp&s=380516b5fde291f4a96c99e89c5ebc01a49e683f submitted by /u/Little_Departure1229 [link] [comments]
- Azure AD Join & Autopilot Questionsby /u/iTechKev on January 29, 2025 at 12:09 am
Looking at docs im seeing a lot of on prem fields when enabling the Azure AD integration. Can you set it up for Azure AD only ? Can you achieve this with a 3rd party LDAP like Okta and DUOS? Does an Azure AD Premium 1 license suffice? submitted by /u/iTechKev [link] [comments]
- Present Windows users from adding other e-mail domains to their Outlookby /u/Grouchy_Crab3253 on January 28, 2025 at 3:07 pm
Is it possible to prevent users of adding additional emails to their Outlook? Its built in, in Intune but we are unable to on Workspace ONE 🙁 Any input appreciated submitted by /u/Grouchy_Crab3253 [link] [comments]
- VPP Token Renew hangsby /u/BlacksmithWarm6755 on January 24, 2025 at 7:01 pm
Anybody having the same issue on version 2406 on Premises? Can't upload and we are already on the latest version 24.6.0.18 https://preview.redd.it/0mc7xotsozee1.png?width=1932&format=png&auto=webp&s=722889888dac2a963dcf9b63c3ac980538c666b2 submitted by /u/BlacksmithWarm6755 [link] [comments]
- Block or Disable Stolen Device Protection for iOS devices.by /u/Ok-WS1-1994 on January 23, 2025 at 11:18 am
Is there any way to Block or Disable Stolen Device Protection for iOS devices? I checked there is no such way from Profile we can do that. If anyone knows the way we can achieve this or what any Custom Profile can do please share your feedback. submitted by /u/Ok-WS1-1994 [link] [comments]
- Prioritize iOS SSO Profile during enrollmentby /u/Ok-WS1-1994 on January 22, 2025 at 7:44 am
We want to Prioritize the iOS SSO profile installation during enrollment, how can we achieve this? The iOS device shows the "Access Denied" screen upon opening the HUB after DEP enrollment. This issue is caused by the delay in installing the SSO profile. As a solution, we have to Prioritize the installation of the SSO profile in the Freestyle Orchestrator, So can someone help me create this New Workflow what exactly do I have to mention, or what Action or Condition do I have to use to achieve this? or is there any other way to do that? I will test this in my Test environment and then PROD. Thanks in advance any help is much appreciated. submitted by /u/Ok-WS1-1994 [link] [comments]
- Migrate from ADFS to Entra ID Omnissa Connectby /u/Big-Tune-326 on January 21, 2025 at 8:48 pm
Howdy community, question for anyone who this applies to. Has anyone migrated from ADFS to Entra ID via Enterprise Federation in Omnissa Connect? (Previously Omnissa Cloud Services) Research states that modifying an existing enterprise federation can only be done via a support ticket (which I have one in already) but was wondering what your experience was like and any helpful tips. Thanks. Article: How Do I Modify The Enterprise Federation Setup submitted by /u/Big-Tune-326 [link] [comments]
- delete devicesby /u/GeekgirlOtt on January 17, 2025 at 1:01 pm
What happens with an iphone in DEP attached to an MDM profile in wsone if you delete it from wsone while it's turned off ? If you have a 'retired' phone and you delete it from the wsone console only and leave it in ABM as is, a year later can it still be factory reset before sending to recycling ? (manually by entering wrong passcode or itunes?) After reset, will it then present again the wsone enrollment screen ? Is there a point to leaving stale devices in the Wsone ? What does it protect against that is not achieved already by leaving it Apple ABM with wsone (or an alternate) MDM assigned ? submitted by /u/GeekgirlOtt [link] [comments]
- How to enable "Open PDF inline for Android" in chromeby /u/ukanoldai on January 17, 2025 at 8:57 am
Hi, When accessing a pdf via an url, the default behaviour of chrome is to download the pdf, so the user has to find and open it. There is now the possibility to enable the settings "Open PDF inline for Android" in chrome. It is available via the chrome settings, or chrome://flags , but i can't find the settings in WS1, neither in the chrome profile in Ws1, or in the Chrome application configuration through the assignment. https://preview.redd.it/g57ro1eeqide1.png?width=250&format=png&auto=webp&s=1d1a64e40f48460b643956a45c2d0790eaf072aa Do you know how to enable it? i thought of custom settings, but didn't find any example. Kind regards submitted by /u/ukanoldai [link] [comments]
- Enable Input Management for App?by /u/refunded_flatulence on January 15, 2025 at 7:29 pm
I've been looking for a way to enable input management for a specific app. It looks like this might not be possible from a MDM standpoint. Has anyone had to do this before that might have had success they could share? submitted by /u/refunded_flatulence [link] [comments]
- Boxer issue - Recurring authenticate again issueby /u/PsychoSilva on January 15, 2025 at 4:59 pm
Wonder if anyone else has ran in to this issue with Boxer application.Issue Summary: We are experiencing a recurring error message in the Boxer application stating, "Your admin has enabled sensitivity labels. Your account credentials may be invalid. Please authenticate again."Details: Error Message: “Your admin has enabled sensitivity labels. Your account credentials may be invalid. Please authenticate again.” Steps to Reproduce: Open the Boxer application. Receive prompt with an error message. Clicking Authenticate temporarily clears the message, but it reappears after closing and reopening the application. Possible Cause: The issue often arises after a password change or when a password expires, suggesting the Boxer application may not be clearing cached credentials correctly. Impact: The error disrupts workflow by requiring repeated authentication and may cause confusion for end-users regarding sensitivity labels and credential validity. The only fix at this time is to uninstall boxer and then reinstall and login with new passwordBoxer support is pointing us to Microsoft but from all the logs review it looks like boxer is not removing the old token and when you close and reopen that old token is put back in to use. We currently have no sensitivity labels policy in place. Just wondering if anyone else has seen this or has a fix since support is running us around. submitted by /u/PsychoSilva [link] [comments]
- Organization Group Change Not Pushedby /u/Select_Equivalent_23 on January 15, 2025 at 1:26 pm
has anyone ever changed an organization group of a device and it not get pushed? I had a device that needed the app store available so i changed it to an organization group that had the app store, but the change never went through. i had to wipe the device and then try again, then it worked. I am just wondering why this happened or if anyone has experienced this before. The device has a cellular plan and had internet access when the organization group was changed. submitted by /u/Select_Equivalent_23 [link] [comments]
- Add emergency calls to Launcher Check-in modeby /u/Stetson_1865 on January 15, 2025 at 9:30 am
Hi, I'm new to the forum and was wondering if someone could help me out. I'm currently building a new Launcher group and was wondering if it's possible to add "Emergency Call" to the checked-in stage? We're using Samsung A32 and A33 OS 13 & 14 devices in our environment. We're running WS1 version 24.6 and Launcher version 24.11 submitted by /u/Stetson_1865 [link] [comments]
- Omnissa Tech Deep Dive: What's new with Workspace ONE Windows?by /u/R_inspired on January 13, 2025 at 10:32 am
submitted by /u/R_inspired [link] [comments]
The Support Insider VMware Support News, Alerts, and Announcements
- Simpler Licensing with VMware vSphere Foundation and VMware Cloud Foundation 5.1.1by Kelcey Lemon on March 21, 2024 at 5:28 pm
Tweet VMware has been on a journey to simplify its portfolio and transition from a perpetual to a subscription model to better serve customers with continuous innovation, faster time to value, and predictable investments. To that end, VMware recently introduced a simplified product portfolio that consists of two primary offerings: VMware Cloud Foundation, our flagship … Continued The post Simpler Licensing with VMware vSphere Foundation and VMware Cloud Foundation 5.1.1 appeared first on VMware Support Insider.
- VMware Skyline Advisor Pro Proactive Findings – January 2024 Editionby James Walker on January 24, 2024 at 11:16 am
Tweet VMware Skyline Advisor Pro releases new proactive Findings every month. Findings are prioritized by trending issues in VMware Technical Support, issues raised through post escalation review, security vulnerabilities, issues raised from VMware engineering, and nominated by customers. For the month of January, we released 60 new Findings. Of these, there are 37 Findings based … Continued The post VMware Skyline Advisor Pro Proactive Findings – January 2024 Edition appeared first on VMware Support Insider.
- Skyline Advisor Pro: Introducing Inventory Export Reportsby Kelcey Lemon on January 16, 2024 at 12:00 pm
Tweet You’ve asked for the ability to export inventory information, including licensing, and we’ve listened. The Skyline Team is proud to introduce this highly requested feature, Inventory Export Reports. Inventory Export Reports allow you to generate reports on your inventory, licensing, and configuration data. These reports can help you to identify potential problems, track changes … Continued The post Skyline Advisor Pro: Introducing Inventory Export Reports appeared first on VMware Support Insider.
- VMware Skyline Advisor Pro Proactive Findings – December 2023 Editionby James Walker on December 15, 2023 at 6:56 pm
Tweet VMware Skyline Advisor Pro releases new proactive Findings every month. Findings are prioritized by trending issues in VMware Technical Support, issues raised through post escalation review, security vulnerabilities, issues raised from VMware engineering, and nominated by customers. For the month of December, we released 56 new Findings. Of these, there are 35 Findings based … Continued The post VMware Skyline Advisor Pro Proactive Findings – December 2023 Edition appeared first on VMware Support Insider.
- VMware Skyline Advisor Pro: Proactive and Diagnostic Findings Demystifiedby Kelcey Lemon on December 13, 2023 at 3:07 pm
Tweet While supporting VMware Explore 2023 in Barcelona, a customer asked me, “What’s the difference between Proactive Findings and Diagnostic Findings in Skyline Advisor Pro and how are each one produced?” So, I’d like to take this moment to elaborate more on my original blog that introduced Diagnostic Findings. Proactive Findings Proactive Findings are potential … Continued The post VMware Skyline Advisor Pro: Proactive and Diagnostic Findings Demystified appeared first on VMware Support Insider.
- VMware Skyline Advisor Pro Proactive Findings – October 2023 Editionby James Walker on October 27, 2023 at 4:33 pm
Tweet VMware Skyline Advisor Pro releases new proactive Findings every month. Findings are prioritized by trending issues in VMware Technical Support, issues raised through post escalation review, security vulnerabilities, issues raised from VMware engineering, and nominated by customers. For the month of October, we released 39 new Findings. Of these, there are 30 Findings based … Continued The post VMware Skyline Advisor Pro Proactive Findings – October 2023 Edition appeared first on VMware Support Insider.
- From upgrading vSphere to troubleshooting issues with Tanzu Kubernetes Grid: Top 10 VMware Tanzu Knowledge Base Articles in September 2023.by Marcela Gleixner on October 11, 2023 at 12:18 pm
From upgrading vSphere to troubleshooting issues with Tanzu Kubernetes Grid: Top 10 VMware Tanzu Knowledge Base Articles in September 2023. The post From upgrading vSphere to troubleshooting issues with Tanzu Kubernetes Grid: Top 10 VMware Tanzu Knowledge Base Articles in September 2023. appeared first on VMware Support Insider.
- 10 most popular KB articles in September 2023, for VMware Tanzu Application Service, BOSH and more.by Marcela Gleixner on October 9, 2023 at 9:54 pm
10 most popular KB articles in September 2023, for VMware Tanzu Application Service, BOSH and more. The post 10 most popular KB articles in September 2023, for VMware Tanzu Application Service, BOSH and more. appeared first on VMware Support Insider.
- Top 10 Most Popular Knowledge Articles for Horizon, WorkspaceONE, End User Computing (EUC), Personal Desktop for September, 2023 by Jamie Gravatte on October 6, 2023 at 4:31 pm
Tweet Get answers and solutions instantly by using VMware’s Knowledge Base (KB) articles to solve known issues. Whether you’re looking to improve your productivity, troubleshoot common issues, or simply learn something new, these most used and most viewed knowledge articles are a great place to start. Here are the top 5 most viewed KB articles … Continued The post Top 10 Most Popular Knowledge Articles for Horizon, WorkspaceONE, End User Computing (EUC), Personal Desktop for September, 2023 appeared first on VMware Support Insider.
- Top 10 Most Popular Knowledge Articles for HCX, SaaS, EPG Emerging Products Group for September, 2023 by Jamie Gravatte on October 5, 2023 at 2:26 pm
Tweet Get answers and solutions instantly by using VMware’s Knowledge Base (KB) articles to solve known issues. Whether you’re looking to improve your productivity, troubleshoot common issues, or simply learn something new, these most used and most viewed knowledge articles are a great place to start. Here are the top 5 most viewed KB articles … Continued The post Top 10 Most Popular Knowledge Articles for HCX, SaaS, EPG Emerging Products Group for September, 2023 appeared first on VMware Support Insider.