The Community

Stay up to date…

VMware End-User Computing Blog Bringing you the latest VMware EUC news, trends and product innovations.

Adam Matthews Technology // IAM // EUC // Random Rubbish

  • I asked ChatGPT to write me a bash script, and it worked (mostly), why do I need to know how to...
    by adam on December 18, 2022 at 11:12 pm

    By now, ChatGPT has become pretty well known ( as of 18th Dec 2022). I’ve messed around with basic questions, but today I wanted to start to write a script that I could use with “OverSight” on Mac (https://objective-see.org/products/oversight.html). When you turn on your camera/mic, it can fire off a script with arguments. In this … Continue reading "I asked ChatGPT to write me a bash script, and it worked (mostly), why do I need to know how to code?"

  • VMware ESXi – How to Remove an NFS Share that’s ‘In Use’
    by adam on December 14, 2022 at 11:35 am

    I recently moved house, and as part of that a few things on my network changed. My NAS (A Synolofy DS8J) changed it’s IP Address. This caused an issue when ESXi was trying to get hold of the datastore. So, now this needs to be removed and replaced – I came across this error: After … Continue reading "VMware ESXi – How to Remove an NFS Share that’s ‘In Use’"

  • Easily Automate your Lab with the vCenter API
    by adam on February 14, 2022 at 6:00 pm

    Learn how to use Python to call the VMware vCenter API to Start and Suspend Virtual Machines easily, and use Crontab to define the times it runs.

  • Quickly Compress Video Files on macOS
    by adam on January 26, 2022 at 11:29 am

    When you record your videos with Quicktime and you end up with 1.7 GB of a file, how do you shrink that?! I’ve been using this process for a couple of years now to optimise the output size of my demo videos, to make it easier to share them in presentations, and to keep my … Continue reading "Quickly Compress Video Files on macOS"

  • WordPress – How to fix Jetpack connection errors, Fonts and Icons showing as squares with NGINX
    by adam on March 5, 2021 at 5:24 pm

    I recently migrated https://blog.eucse.com/blog from running on Apache to Nginx. I found it helped a lot with utilization and speed (combined with a few more tweaks), but one thing I noticed after was Jetpack wouldn’t load correctly, and some fonts and icons were showing as squares. See examples of what I was seeing below: Resolution … Continue reading "WordPress – How to fix Jetpack connection errors, Fonts and Icons showing as squares with NGINX"

Arsen Bandurian: Technical Blog Digital Workspace, End User Computing, Enterprise Mobility, AutoID, WLANs, OSes and other technical stuff I happen to work with

  • Check if a Microsoft Form comes from a trusted source
    by apcsb on November 6, 2023 at 10:14 am

    When you open a Microsoft Form asking you for some sensitive data, do you know where will your data land? Could it be phishing? Read on to find out… Recently, I have received an email at work asking me to fill out a form with some of sensitive personal details (voluntary disclosure).  I don’t mind... Continue Reading →

  • Enhancing Windows Update Catalog metadata Accessibility
    by apcsb on September 11, 2023 at 7:30 am

    Microsoft has recently released a major update to the Windows Update catalog back-end, adding crucial information such as CVEs (Common Vulnerabilities and Exposures) addressed by the update and the CVE Score directly info API. This information is essential for Threat and Vulnerability Management decisions as well as Patch management and many organizations pay $$ for... Continue Reading →

  • Quickly validate and enable manual application uninstall via Intune Company Portal using Graph API
    by apcsb on August 3, 2023 at 7:04 am

    I am back and the titles are getting longer! If you are an Intune admin, you will probably be happy to know that one of the most required features has landed: Uninstall Win32 and Microsoft store apps using the Windows Company Portal. One thing you need to be aware of, is that this feature is... Continue Reading →

  • Building a custom Windows Update Report p1: Parsing HTML via PowerShell on modern systems (no IE)
    by apcsb on July 28, 2022 at 7:30 am

    Wow, it’s been a while! A customer of mine recently wanted a detailed report that should include info such as how many weeks is the Windows on the machine behind the latest available Security Update. We’ve found to a way to combine Intune Data Warehouse and PowerBI to pull data that allows to identify the... Continue Reading →

  • A case of OneDrive Personal Vault not coming up (0x8031000a, MDM, GPO and BitLocker)
    by apcsb on March 18, 2022 at 6:23 pm

    Today I wanted to enable the Personal Vault feature on my Home PC. While following the wizard I got an error 0x8031000a “Your organization requires your device to join the domain before you can use the Personal Vault”. What does this have to do with MDM. GPO and BitLocker troubleshooting? Here’s some quick Friday entertainment!... Continue Reading →

  • AAB support for private apps in the managed Google Play iFrame is coming, take a first look here
    by Jason Bayton on March 22, 2025 at 12:00 am

    The Android App Bundle (AAB) is a modern application packaging format introduced by Google to streamline and optimise Android app distribution. Unlike the traditional APK, an AAB contains all the necessary compiled code, resources, and assets for an app only for the purpose of permitting dynamic packaging; it cannot be directly installed through Android's package manager on-device (3rd party options exist though!). Instead, it is uploaded to Google Play, which dynamically processes & bundles the respective code into highly-optimised APKs specific to the device(s) downloading the app. The AAB format has been available to Android developers since 2018, and mandatory for new app uploads from the Google Play console since 2021. The Google Play iFrame, used by enterprises for private app distribution, has however historically mandated APK uploads. Based on a recently-updated help doc, support for AAB in enterprise scenarios appears to be now possible, although it doesn't seem fully rolled out yet. All the same, I spent some time figuring out what's possible so you don't have to! How AAB and APKs differ # First thing's first, is this a pitch to organisations to immediately push all private applications over to AAB? No. There are valid use cases for both, which presumably (in addition to understanding the effort it may take organisations to convert over) is why Google will continue supporting APKs in the iFrame. That said, here's a brief overview of each. APKs # An APK is a single package file containing all the resources, assets, and compiled code for all supported device configurations. While this offers the greatest compatibility across a device estate, it means APK files are often larger than necessary as they include resources irrelevant to the downloading device. APKs offer simplicity and convenience for developers who want a quick, straightforward way to package and share their applications. They ensure broad compatibility across all Android devices without additional processing or conversion. Additionally, APKs support offline installation, making them ideal for environments with limited or no connectivity. Their self-contained nature enables immediate deployment and rapid testing, which accelerates development and iteration cycles. Furthermore, APKs provide flexibility by allowing distribution through various channels beyond Google Play, including alternative app stores or direct downloads. Finally, because APKs don't rely on Google Play explicitly, they're suitable for devices lacking Google Play access, or regions where it isn't available. That covers everything from deployment to devices in restricted countries such as China, to closed-network environments without direct access to Google Play. AOSP is a consideration also, but there's a lot more to managing AOSP that I won't dive into here. Android App Bundles (AAB) # Like an APK, an AAB is a publishing format containing all the necessary components in a single file, the difference is in the processes that occur after uploading to Google Play, as I opened with above. As well as significantly reducing app sizes through dynamically generated, optimised APKs tailored to each user's device, AABs also support dynamic delivery of features and resources, enabling efficient feature rollouts and resource management. Release management is also simplified, as developers maintain only a single upload file, eliminating the need to manually handle multiple APK variants for different architectures or feature sets. Additionally, AAB leverages App Signing by Google Play, centralising key management, potentially increasing security, and simplifying key recovery — particularly sometimes beneficial in organisations who have struggled with key storage and management in the past. Finally, AABs allow for larger uploads to Google Play, exceeding the 100MB APK limit that appears to be a blocker for the organisations I've worked with quite often. Leveraging AABs with Android Enterprise # In enterprise scenarios, Android App Bundles enable organisations to deliver tailored application experiences by dynamically serving device-specific features, languages, and resources as needed. This customisation simplifies version management, reduces deployment overhead, and leads to streamlined app lifecycle management, significantly improving end-user experiences. For organisations operating under tight data budgets, the optimised app sizes alone can justify migrating to the AAB format due to significantly reduced download sizes and improved efficiency. Enough talk, AABs in action # For the context of this article, I opted to take an existing APK and convert it to AAB. There are two reasons for this: It seemed like the more complex approach, so makes for more interesting reading. Google hasn't yet turned on AAB uploads for new private apps from the iFrame for my enterprises. So I couldn't show that if I wanted to. Here's where we start; I have a private application uploaded as an APK: Clicking into the application, I can select Advanced editing options to head to the Google Play Console: I can then head into the application, click Test and release > Production and create a new release. All so far, so normal. Other tracks are available if Production isn't desired. On any other day, if I were to manage an app update from within the Play Console - which is a perfectly valid approach for organisations with advanced knowledge of developing and distributing applications - I would upload an APK via the upload link. We're not here for APKs though. To go further, I need to enrol into Play app signing. Enrol into Play app signing # Play app signing is a requirement for AABs, as Google needs to be able to sign generated APKs on behalf of the organisation when distributing them to devices. I'm clicking Use Play app signing to continue: For organisations/developers using a Java KeyStore to facilitate application signing, either via Android Studio or otherwise, this next step offers a guide for extracting the private key from it to allow Google to manage it. I'm using Android Studio and want to upload the key I used to originally sign the APKs, so that's what I'm configuring here: Give Google our keys!? This is down to the organisation and/or the personal views of the developer. I can appreciate this isn't a desirable choice for some, and that's OK. Google offers alternatives for setup, including dual-releases, but you can stop here and return to APK management if desired. If you're on the fence, pros and cons: Pros: Simplified Key Management: Google securely stores and manages your app signing keys, reducing the complexity and risk of losing keys. They're stored securely: Google uses strong cryptographic security standards to store keys securely, minimising potential breaches or key leaks. Easy key recovery: In case of compromised or lost upload keys, Google provides a straightforward and secure method for recovery without losing your app’s listing and user base. Optimised distribution: Google Play can leverage advanced features like dynamic feature modules and optimised delivery because they control the final signing process. Cons: Loss of direct control: You relinquish direct control over your signing keys to Google, leaving your app's distribution and security dependent on Google's practices and infrastructure (via Play). Dependence on Google: You'll require careful planning if you choose to distribute your app via alternative channels (non-Play) to ensure friction points are minimised. Security concerns: Organisations with strict security or compliance policies might find Google's key management approach incompatible with their internal security practices. Ultimately, whether Google Play App Signing is suitable depends on your organisation’s requirements for security, flexibility, compliance, and control. That isn't a finite list. Still here? Let's continue! The script in the above image is: java -jar pepk.jar --keystore=foo.keystore --alias=foo --output=encrypted_private_key_path --rsa-aes-encryption --encryption-key-path=/path/to/encryption_public_key.pem Note: The KeyStore and alias - if you're unfamiliar - should match what's shown in Android Studio when prompted during the building of a signed application. If you know what you're doing, do your thing. Once the private key .PEM file is output, it can be uploaded to Google via Upload private key: After which I'm then prompted to agree to Play app signing terms. I glanced at it for a good 15 seconds. And we're enrolled: Upload the AAB # There are two ways to now get the AAB up, via console and via iFrame. To ensure it works as I'd expect it to, I opted first to test it in the console where I am confident AAB uploads would be supported. Not least because there's a draft release still pending. I headed back to Test and release > Production, and clicked the Releases tab, allowing me to Edit release: As now pictured, Releases signed by Google Play is showing, so I'm good to select and upload an AAB in the upload area below: If you scroll up, you'll note the version in the managed Play iFrame was on version 1.0, and the console here is now showing version 2 (1.1). I carried on through the process, paying attention to any damning errors, warnings, and messages (the Play Console is missing an Oxford comma, there). I chose to ignore two warnings about obfuscation and a government declaration, because I haven't needed to worry about them in the iFrame. I'll update here if that becomes a problem later: Send the change(s) for review.. ..and voilà! 8 nail-biting minutes later, the iFrame also updated to the latest build. And finally, it pushed to my test device nice and quickly, no fuss at all. Note the size difference between versions below. All I did was bump the version in build.gradle and build an AAB rather than an APK for the newer version! Note: I'm aware this is not the same device, their version sizes matched on 1.0, though. What needs work? # While in the iFrame, I'd be remiss if I didn't test it here also. Here's one of a few snags with the process currently, which I'll state after the image: Did you see it? It still references APK file, but it does in fact allow the upload of an AAB. Luckily the file extension is conveniently left in place (thanks, Google!) so you can see it is, indeed, an AAB. Based on Google's help doc, what we can expect to see, at some point, is a more generic label replacing APK file: One of the other snags that currently exists is the inability to upload an AAB as a new application from the iFrame, even having followed Google's guidance in enabling Play app signing. The upload allows the selection of an AAB, but the submit button remains greyed out. I went into browser tools and manually enabled the button, only to be met with another error: It's worth pointing out when Google does allow direct AAB uploads from the iFrame, they'll generate the key: Note: Private apps that are created for the first time by uploading an AAB to the iframe will use a Google-generated app signing key. Use one of the options below to use your own signing key: Use the Play Console to create the private app with an AAB Use the iframe to create the private app with an APK then switch to AAB. Tying back to the callout above, if you have desires to use your own key with all uploaded apps, follow their advice and use the console with a full developer account to upload a new application. Finally, and hopefully another symptom of this not yet being fully rolled out, is the lack of permissions for key management: It's an ongoing frustration generally, actually; permissions are overly restrictive across the portal due to the unique way Android Enterprise app management is set up. I'd like to be able to have my delegated accounts (i.e. [email protected], not the Google service account) act like an admin when it is granted admin permissions: create apps here, rotate keys in this instance, and so on. I haven't been able to get that working as yet. In summary # Google's move toward supporting Android App Bundles for private app distribution in the managed Google Play iFrame is well overdue, but great to see. While clearly still in the rollout phase, early exploration shows what's already possible and highlights some areas needing further refinement. For organisations ready to embrace smaller app sizes, streamlined deployments, and more flexible/redundant key management, the transition from APK to AAB is worth considering, at least when it becomes fully available; full support within the iFrame will undoubtedly make this process smoother and more broadly accessible in the near future. As always, plan your strategy carefully—particularly around key management and app distribution—to align with your organisation's security, compliance, and operational requirements.

  • AAB support for private apps in the managed Google Play iFrame is coming, take a first look here
    by Jason Bayton on March 22, 2025 at 12:00 am

    The Android App Bundle (AAB) is a modern application packaging format introduced by Google to streamline and optimise Android app distribution. Unlike the traditional APK, an AAB contains all the necessary compiled code, resources, and assets for an app only for the purpose of permitting dynamic packaging; it cannot be directly installed through Android's package manager on-device (3rd party options exist though!). Instead, it is uploaded to Google Play, which dynamically processes & bundles the respective code into highly-optimised APKs specific to the device(s) downloading the app. The AAB format has been available to Android developers since 2018, and mandatory for new app uploads from the Google Play console since 2021. The Google Play iFrame, used by enterprises for private app distribution, has however historically mandated APK uploads. Based on a recently-updated help doc, support for AAB in enterprise scenarios appears to be now possible, although it doesn't seem fully rolled out yet. All the same, I spent some time figuring out what's possible so you don't have to! How AAB and APKs differ # First thing's first, is this a pitch to organisations to immediately push all private applications over to AAB? No. There are valid use cases for both, which presumably (in addition to understanding the effort it may take organisations to convert over) is why Google will continue supporting APKs in the iFrame. That said, here's a brief overview of each. APKs # An APK is a single package file containing all the resources, assets, and compiled code for all supported device configurations. While this offers the greatest compatibility across a device estate, it means APK files are often larger than necessary as they include resources irrelevant to the downloading device. APKs offer simplicity and convenience for developers who want a quick, straightforward way to package and share their applications. They ensure broad compatibility across all Android devices without additional processing or conversion. Additionally, APKs support offline installation, making them ideal for environments with limited or no connectivity. Their self-contained nature enables immediate deployment and rapid testing, which accelerates development and iteration cycles. Furthermore, APKs provide flexibility by allowing distribution through various channels beyond Google Play, including alternative app stores or direct downloads. Finally, because APKs don't rely on Google Play explicitly, they're suitable for devices lacking Google Play access, or regions where it isn't available. That covers everything from deployment to devices in restricted countries such as China, to closed-network environments without direct access to Google Play. AOSP is a consideration also, but there's a lot more to managing AOSP that I won't dive into here. Android App Bundles (AAB) # Like an APK, an AAB is a publishing format containing all the necessary components in a single file, the difference is in the processes that occur after uploading to Google Play, as I opened with above. As well as significantly reducing app sizes through dynamically generated, optimised APKs tailored to each user's device, AABs also support dynamic delivery of features and resources, enabling efficient feature rollouts and resource management. Release management is also simplified, as developers maintain only a single upload file, eliminating the need to manually handle multiple APK variants for different architectures or feature sets. Additionally, AAB leverages App Signing by Google Play, centralising key management, potentially increasing security, and simplifying key recovery — particularly sometimes beneficial in organisations who have struggled with key storage and management in the past. Finally, AABs allow for larger uploads to Google Play, exceeding the 100MB APK limit that appears to be a blocker for the organisations I've worked with quite often. Leveraging AABs with Android Enterprise # In enterprise scenarios, Android App Bundles enable organisations to deliver tailored application experiences by dynamically serving device-specific features, languages, and resources as needed. This customisation simplifies version management, reduces deployment overhead, and leads to streamlined app lifecycle management, significantly improving end-user experiences. For organisations operating under tight data budgets, the optimised app sizes alone can justify migrating to the AAB format due to significantly reduced download sizes and improved efficiency. Enough talk, AABs in action # For the context of this article, I opted to take an existing APK and convert it to AAB. There are two reasons for this: It seemed like the more complex approach, so makes for more interesting reading. Google hasn't yet turned on AAB uploads for new private apps from the iFrame for my enterprises. So I couldn't show that if I wanted to. Here's where we start; I have a private application uploaded as an APK: Clicking into the application, I can select Advanced editing options to head to the Google Play Console: I can then head into the application, click Test and release > Production and create a new release. All so far, so normal. Other tracks are available if Production isn't desired. On any other day, if I were to manage an app update from within the Play Console - which is a perfectly valid approach for organisations with advanced knowledge of developing and distributing applications - I would upload an APK via the upload link. We're not here for APKs though. To go further, I need to enrol into Play app signing. Enrol into Play app signing # Play app signing is a requirement for AABs, as Google needs to be able to sign generated APKs on behalf of the organisation when distributing them to devices. I'm clicking Use Play app signing to continue: For organisations/developers using a Java KeyStore to facilitate application signing, either via Android Studio or otherwise, this next step offers a guide for extracting the private key from it to allow Google to manage it. I'm using Android Studio and want to upload the key I used to originally sign the APKs, so that's what I'm configuring here: Give Google our keys!? This is down to the organisation and/or the personal views of the developer. I can appreciate this isn't a desirable choice for some, and that's OK. Google offers alternatives for setup, including dual-releases, but you can stop here and return to APK management if desired. If you're on the fence, pros and cons: Pros: Simplified Key Management: Google securely stores and manages your app signing keys, reducing the complexity and risk of losing keys. They're stored securely: Google uses strong cryptographic security standards to store keys securely, minimising potential breaches or key leaks. Easy key recovery: In case of compromised or lost upload keys, Google provides a straightforward and secure method for recovery without losing your app’s listing and user base. Optimised distribution: Google Play can leverage advanced features like dynamic feature modules and optimised delivery because they control the final signing process. Cons: Loss of direct control: You relinquish direct control over your signing keys to Google, leaving your app's distribution and security dependent on Google's practices and infrastructure (via Play). Dependence on Google: You'll require careful planning if you choose to distribute your app via alternative channels (non-Play) to ensure friction points are minimised. Security concerns: Organisations with strict security or compliance policies might find Google's key management approach incompatible with their internal security practices. Ultimately, whether Google Play App Signing is suitable depends on your organisation’s requirements for security, flexibility, compliance, and control. That isn't a finite list. Still here? Let's continue! The script in the above image is: java -jar pepk.jar --keystore=foo.keystore --alias=foo --output=encrypted_private_key_path --rsa-aes-encryption --encryption-key-path=/path/to/encryption_public_key.pem Note: The KeyStore and alias - if you're unfamiliar - should match what's shown in Android Studio when prompted during the building of a signed application. If you know what you're doing, do your thing. Once the private key .PEM file is output, it can be uploaded to Google via Upload private key: After which I'm then prompted to agree to Play app signing terms. I glanced at it for a good 15 seconds. And we're enrolled: Upload the AAB # There are two ways to now get the AAB up, via console and via iFrame. To ensure it works as I'd expect it to, I opted first to test it in the console where I am confident AAB uploads would be supported. Not least because there's a draft release still pending. I headed back to Test and release > Production, and clicked the Releases tab, allowing me to Edit release: As now pictured, Releases signed by Google Play is showing, so I'm good to select and upload an AAB in the upload area below: If you scroll up, you'll note the version in the managed Play iFrame was on version 1.0, and the console here is now showing version 2 (1.1). I carried on through the process, paying attention to any damning errors, warnings, and messages (the Play Console is missing an Oxford comma, there). I chose to ignore two warnings about obfuscation and a government declaration, because I haven't needed to worry about them in the iFrame. I'll update here if that becomes a problem later: Send the change(s) for review.. ..and voilà! 8 nail-biting minutes later, the iFrame also updated to the latest build. And finally, it pushed to my test device nice and quickly, no fuss at all. Note the size difference between versions below. All I did was bump the version in build.gradle and build an AAB rather than an APK for the newer version! Note: I'm aware this is not the same device, their version sizes matched on 1.0, though. What needs work? # While in the iFrame, I'd be remiss if I didn't test it here also. Here's one of a few snags with the process currently, which I'll state after the image: Did you see it? It still references APK file, but it does in fact allow the upload of an AAB. Luckily the file extension is conveniently left in place (thanks, Google!) so you can see it is, indeed, an AAB. Based on Google's help doc, what we can expect to see, at some point, is a more generic label replacing APK file: One of the other snags that currently exists is the inability to upload an AAB as a new application from the iFrame, even having followed Google's guidance in enabling Play app signing. The upload allows the selection of an AAB, but the submit button remains greyed out. I went into browser tools and manually enabled the button, only to be met with another error: It's worth pointing out when Google does allow direct AAB uploads from the iFrame, they'll generate the key: Note: Private apps that are created for the first time by uploading an AAB to the iframe will use a Google-generated app signing key. Use one of the options below to use your own signing key: Use the Play Console to create the private app with an AAB Use the iframe to create the private app with an APK then switch to AAB. Tying back to the callout above, if you have desires to use your own key with all uploaded apps, follow their advice and use the console with a full developer account to upload a new application. Finally, and hopefully another symptom of this not yet being fully rolled out, is the lack of permissions for key management: It's an ongoing frustration generally, actually; permissions are overly restrictive across the portal due to the unique way Android Enterprise app management is set up. I'd like to be able to have my delegated accounts (i.e. [email protected], not the Google service account) act like an admin when it is granted admin permissions: create apps here, rotate keys in this instance, and so on. I haven't been able to get that working as yet. In summary # Google's move toward supporting Android App Bundles for private app distribution in the managed Google Play iFrame is well overdue, but great to see. While clearly still in the rollout phase, early exploration shows what's already possible and highlights some areas needing further refinement. For organisations ready to embrace smaller app sizes, streamlined deployments, and more flexible/redundant key management, the transition from APK to AAB is worth considering, at least when it becomes fully available; full support within the iFrame will undoubtedly make this process smoother and more broadly accessible in the near future. As always, plan your strategy carefully—particularly around key management and app distribution—to align with your organisation's security, compliance, and operational requirements.

  • What's new (so far) for enterprise in Android 16
    by Jason Bayton on January 30, 2025 at 12:00 am

    A little earlier in the year, Android 16 beta 1 has just landed! With the first beta available, it's time to take a look at what's new, so far, in Android 16 "Baklava". This is, as last year, a non-definitive and unconfirmed list of changes. Like the work profile changes in Android 14 things can change at any point and without warning. Here we go! No bump to minimum SDK version for installation of apps # The first beta does not include a change to minimum SDK for app installation. Will it come later? We shall see. For context, every year now since 14 the minimum version an application must target has increased. In Android 15 it was 24, in 14 it was 23.. If you're interested in what "targeting" is, it looks like this within an application's configuration: defaultConfig { applicationId = "org.bayton.example" minSdk = 24 targetSdk = 23 versionCode = 1 versionName = "1.0" } Minimum SDK is the lowest version of Android an application will support, this typically changes when new features introduced could cause compatibility issues. It could also change when a developer no longer wishes to support an older version of Android. In either case the application will no longer be available for installation from Google Play on an affected device, and will error when sideloaded. With the shift in timing for this release it's not clear if this'll be mandated so soon after the bump to 24 in 15, or if that'll come in a quarterly release at a later point. Currently 16 follows 15: only apps that target Android 7.0 - API level 24 - or later will be permitted. jason@MBP adb install app-release.apk Performing Streamed Install adb: failed to install app-release.apk: Failure [INSTALL_FAILED_DEPRECATED_SDK_VERSION: App package must target at least SDK version 24, but found 23] To reiterate my sentiment from last year on this topic: As ever, we're talking about applications targeting a version of Android 10+ years old. While some organisations with line-of-business apps that haven't seen an update in half a decade may balk at the idea of getting their applications updated or rewritten, the justification behind this limitation is solid - security. Where apps targeting <6.0 were able to abuse the old permissioning system (pre-runtime!), apps targeting 7.0 are still able to abuse device administrator and similar APIs. This isn't something you want potentially leveraged directly or indirectly on your managed estate. App functions control # Not too much research has been done about this feature arriving in 16, but from what I've found, this looks like a new way of allowing applications to interact with one another through the publishing of "functions" an app can perform. Google's example here suggests an assistant app can search on-device for applications with a known function for creating a note, which replaces a slightly more convoluted approach app developers have to take today: An assistant app is trying to fulfill the user request "Save XYZ into my note". The assistant app should first list all available app functions as AppFunctionStaticMetadata documents from AppSearch. Then, it should identify an app function that implements the CreateNote schema. Finally, the assistant app can invoke executeAppFunction(ExecuteAppFunctionRequest, Executor, CancellationSignal, OutcomeReceiver) with the functionIdentifier of the chosen function. This feels, and not just because of the example used, like it'll make the lives of Gemini, ChatGPT, and many other assistant application developers far easier. What I don't get from the example offered is how to target apps. I could have Keep, Obsidian, and several other apps offering a function to create a note. I'm sure this will be explained in due course though (if it isn't already and I just missed it). For enterprise, Google has added a few restrictions on app functions; they can currently be disabled outright, and disabled cross-profile. I'm hopeful we'll see this ecpand to follow Credential Manager and Widget APIs that allow a block with package exclusions for greater control. We'll see. Disallow NFC radio # Originally found in the Android 15 documentation, this one was referenced in the UserManager APIs, but never ultimately landed in 15. As it says on the tin. If you're thinking "Don't we already have an API for NFC?" Yes we do, but that's to control the beaming of data between devices. This is a full on radio disable and will probably live under DeviceRadioState in AMAPI at some point later. As of this release it's now officially showing up as a Baklava feature. Disallow Thread Network # Here's another previously-referenced feature to show up confirmed for Baklava. This is related to comms with thread devices. Again, it's a cut-and-dry, simple restriction. More details on its use will come in time. Automatic time & automatic time zone policies # New in 16 as of (around) beta 3 are two new policies, automatic time and automatic time zone. Both of these APIs have existed since Android 11 with setAutoTimeEnabled and setAutoTimeZoneEnabled respectively, and even prior to 11 there were APIs that influenced time and time zone settings. There's currently no justification documented for revamping these again, and I don't want to speculate, but as and when more information is shared I will update here. That's not all folks! # This is extremely short and sweet given how early in the process we are for 16. Expect several more betas with several more changes. Check back here again soon!

  • What's new (so far) for enterprise in Android 16
    by Jason Bayton on January 30, 2025 at 12:00 am

    A little earlier in the year, Android 16 beta 1 has just landed! With the first beta available, it's time to take a look at what's new, so far, in Android 16 "Baklava". This is, as last year, a non-definitive and unconfirmed list of changes. Like the work profile changes in Android 14 things can change at any point and without warning. Here we go! No bump to minimum SDK version for installation of apps # The first beta does not include a change to minimum SDK for app installation. Will it come later? We shall see. For context, every year now since 14 the minimum version an application must target has increased. In Android 15 it was 24, in 14 it was 23.. If you're interested in what "targeting" is, it looks like this within an application's configuration: defaultConfig { applicationId = "org.bayton.example" minSdk = 24 targetSdk = 23 versionCode = 1 versionName = "1.0" } Minimum SDK is the lowest version of Android an application will support, this typically changes when new features introduced could cause compatibility issues. It could also change when a developer no longer wishes to support an older version of Android. In either case the application will no longer be available for installation from Google Play on an affected device, and will error when sideloaded. With the shift in timing for this release it's not clear if this'll be mandated so soon after the bump to 24 in 15, or if that'll come in a quarterly release at a later point. Currently 16 follows 15: only apps that target Android 7.0 - API level 24 - or later will be permitted. jason@MBP adb install app-release.apk Performing Streamed Install adb: failed to install app-release.apk: Failure [INSTALL_FAILED_DEPRECATED_SDK_VERSION: App package must target at least SDK version 24, but found 23] To reiterate my sentiment from last year on this topic: As ever, we're talking about applications targeting a version of Android 10+ years old. While some organisations with line-of-business apps that haven't seen an update in half a decade may balk at the idea of getting their applications updated or rewritten, the justification behind this limitation is solid - security. Where apps targeting <6.0 were able to abuse the old permissioning system (pre-runtime!), apps targeting 7.0 are still able to abuse device administrator and similar APIs. This isn't something you want potentially leveraged directly or indirectly on your managed estate. App functions control # Not too much research has been done about this feature arriving in 16, but from what I've found, this looks like a new way of allowing applications to interact with one another through the publishing of "functions" an app can perform. Google's example here suggests an assistant app can search on-device for applications with a known function for creating a note, which replaces a slightly more convoluted approach app developers have to take today: An assistant app is trying to fulfill the user request "Save XYZ into my note". The assistant app should first list all available app functions as AppFunctionStaticMetadata documents from AppSearch. Then, it should identify an app function that implements the CreateNote schema. Finally, the assistant app can invoke executeAppFunction(ExecuteAppFunctionRequest, Executor, CancellationSignal, OutcomeReceiver) with the functionIdentifier of the chosen function. This feels, and not just because of the example used, like it'll make the lives of Gemini, ChatGPT, and many other assistant application developers far easier. What I don't get from the example offered is how to target apps. I could have Keep, Obsidian, and several other apps offering a function to create a note. I'm sure this will be explained in due course though (if it isn't already and I just missed it). For enterprise, Google has added a few restrictions on app functions; they can currently be disabled outright, and disabled cross-profile. I'm hopeful we'll see this ecpand to follow Credential Manager and Widget APIs that allow a block with package exclusions for greater control. We'll see. Disallow NFC radio # Originally found in the Android 15 documentation, this one was referenced in the UserManager APIs, but never ultimately landed in 15. As it says on the tin. If you're thinking "Don't we already have an API for NFC?" Yes we do, but that's to control the beaming of data between devices. This is a full on radio disable and will probably live under DeviceRadioState in AMAPI at some point later. As of this release it's now officially showing up as a Baklava feature. Disallow Thread Network # Here's another previously-referenced feature to show up confirmed for Baklava. This is related to comms with thread devices. Again, it's a cut-and-dry, simple restriction. More details on its use will come in time. Automatic time & automatic time zone policies # New in 16 as of (around) beta 3 are two new policies, automatic time and automatic time zone. Both of these APIs have existed since Android 11 with setAutoTimeEnabled and setAutoTimeZoneEnabled respectively, and even prior to 11 there were APIs that influenced time and time zone settings. There's currently no justification documented for revamping these again, and I don't want to speculate, but as and when more information is shared I will update here. That's not all folks! # This is extremely short and sweet given how early in the process we are for 16. Expect several more betas with several more changes. Check back here again soon!

  • Android 15: What's new for enterprise?
    by Jason Bayton on October 31, 2024 at 12:00 am

    Android 15 launched officially for Pixel on October 15th. This was about a month and a half after the release to AOSP on September 3rd. It has been a rather odd series of events this year; Pixel typically receives the latest and greatest version of Android in tandem with its release to AOSP, and the marketing and messaging goes out in unison for Android as a whole, but with Pixel's delay it caused something of an anticlimactic debut for AOSP, with most of the Android 15 blogs and announcements only really happening at Pixel's launch. Hopefully that doesn't become the norm, I'm not a fan of delaying announcements until an OEM - Pixel or otherwise - is ready with their own implementation; I can't imagine Google would have done this if Oppo, Samsung, HMD or others asked for the same. That said, here we are. I could have covered this post off for the most-part after the AOSP drop, I chose to wait until Google released their marketing materials. AOSP/developer docs rarely tell the whole story of enterprise support in an Android release, and 15 has been no different; I'd covered pretty much everything I found for AOSP in What's new (so far) for enterprise in Android 15 and so it was the wider Google Play Services and undocumented functionalities that were left to be covered. The below aims to provide a comprehensive overview of enterprise features, so may skip some items mentioned in the blog from April. Feel free to jump back there (link above) for more general Android 15 features. Let's start with a headline feature. Private Space # Android 15 introduces Private Space, the ability for users to protect a selection of apps in a private, additionally-authenticated profile on the device. These applications are isolated - similar to a work profile - from the rest of the applications on the primary parent profile. When Google announced Private Space with 15, I wrongfully anticipated this to be a mostly non-enterprise feature that wouldn't coexist in the management space. After all, it comes across as the work profile for unmanaged devices, in a way (certainly the tech it's built on tells me this). But here we are! The multiple work profiles on one device I've been asking for that Google said they'd never support 😁. Default behaviour for managed devices # The way this is managed is nuanced, per Google: The default value for an unmanaged user is false. For users with a device owner set, the default value is true and the device owner currently cannot change it to false. On organization-owned managed profile devices, the default value is false but the profile owner can change it to true via the parent profile to block creating of private profiles on the personal user. So in other words Private Space is disabled for fully managed devices by default, and cannot be enabled. For work profile-enabled company-owned devices, this can be managed. In testing, my fully managed device does indeed fail to create a Private Space, but doesn't indicate why - it simply fails: An interjection from the DPC to say this isn't possible would tremendously improve the UX. General management policies in the Private Space # If you're concerned the Private Space may become a wild-west of hidden app and user activity, fret not! Policies that have previously applied device-wide, such as the installation of apps from unknown sources, are still device-wide. The Private Space adopts these restrictions with no additional management overhead. Application management in the Private Space # While it's blocked on fully managed devices (which would be a great use case for a reversed COPE, I'll touch on below), it's very much possible to create a Private Space in COPE and co-exist with the work profile. Hang on, you may be thinking, doesn't that just mean users can add apps to a Private Space if they're not permitted to add them to their personal profile? As it turns out, no. Android 15 for business introduces the ability to apply a limited set of security restrictions to specific apps outside the Work Profile. Existing personal app allowlist or blocklist policies can be extended to the new private space feature. In the future, additional privacy preserving security configurations for core apps will be introduced and made backward compatible with Android 15. via The policies applied for permitted or blocked apps in a COPE deployment scenario also apply to the Private Space for AMAPI enrolments. CustomDPC EMMs will gain the same functionality at a later date (no ETA provided by Google). The case for Private Space on fully managed devices # It popped up in the AE Customer Community and I think it's worth further discussion: I quite like the prospect of reversing the existing COPE model to fully manage the device, but have an inaccessible profile (Private Space) for workers. Maximum control of the device with a lower-perceived, but potentially acceptable level of privacy for workers. As indicated for pool/shared devices where you auth, but can pop a few personal apps for break/other reasons the admins can ultimately remove at will.. I like it. Private Space has obviously not been enabled on fully managed devices due to the privacy concerns, I would assume, previously associated with work profiles on fully managed devices. Furthermore, I would expect there are nuances within a fully managed and dedicated use cases (which are mostly shared under the Device Owner (DO) ownership model) that would render this feature incompatible and possibly cause problems. It's also likely a lot of work resurrecting deprecated approaches to cross-profile policies and such that would bring this much closer to pre-11 Android fully managed devices with work profiles.. ..but it could be disabled by default, as it is for fully managed devices, and in organisations that want to allow a reverse-COPE wherein personal apps and data live in a separately encrypted, isolated container with limited cross-profile oversight (personal usage policies would have to apply on fully managed only, just for Private Space), it could work. Supporting this would further add the flexibility organisations want as the personally-owned vs company-owned debate rages on amongst admins. What Private Space isn't # Fort Knox. Unfortunately, and Google to their credit do highlight this, Private Space is still a profile running within Android; the applications installed in this space can be detected with relative ease and so although it makes it extremely difficult to access app data, it doesn't prevent the determined from piecing together a perception of someone based on the apps they're hiding away. Assuming they have access to the device. Giant Private Space icons added in PACKAGE SEARCH for emphasis only. I do feel it could be improved, for example with the work profile implementation there are policies that prevent an app inside the profile from locating applications outside of it, so if I run PACKAGE SEARCH within a work profile, I cannot see the user apps installed in the parent profile. I appreciate this is not 1:1, effectively asking apps in the parent profile to be blocked from running package manager searches on any packages flagged against the Private Space, but I'd like to believe it's possible. So that's Private Space. Next? COPE: Enhancements to company-owned work profiles (COPE) # Google has been busy this year boosting the functionality of the company-owned work profile deployment scenario, and it's a trend I'm here for! Still struggling with the loss of work profiles on fully managed devices, every small bump in functionality that regains some control over the parent (personal) profile of a company-owned device is nothing short of a treat. Here's what's new in Android 15: Control of parent profile screen settings in company-owned work profile deployment scenarios # For company-owned devices running work profile, the following previously fully managed-only restrictions can be applied to devices: Screen off timeout (not to be confused with time to lock, which still supersedes this in terms of hierarchy) Screen brightness (the actual brightness or the screen) Screen brightness mode (manual or automatic) Google announced these as power management controls, I suppose they could contribute to lower power consumption at the cost of user satisfaction if you were to enforce fixed brightness on personal-use devices. They could also contribute to significantly higher power consumption. I'm not sure what use cases were identified here that led to it being framed this way, but I imagine this could be a frustrating experience for knowledge workers if not implemented by organisations appropriately; who could use a device outside on a Summer's day while being limited to 30% brightness? Who would want to check an incoming call or notification in the middle of the night with a screen that doesn't adapt to the ambient conditions of the room, but rather turn on at 100% brightness? In contrast, enforcing automatic would be a sensible default. Be mindful if deploying fixed brightness or brightness modes to personal-use devices. Application defaults in the personal profile for company-owned work profile devices # Extending further control of the personal side of the device for COPE deployments, Google is allowing organisations in Android 15 to set default applications for the dialler, messaging app, and browser. To be absolutely clear, these defaults will be whatever the Android device ships with, so it wouldn't be possible to set Edge as a default in the personal profile across a managed estate. Rather, Samsung may default to Samsung Internet, Pixel to Chrome, etc. This avoids a potential privacy risk in allowing organisations to set their preferred apps as the personal default, complete with whatever identifying information and usage data they may be able to extract from the personal profile and into corporate servers. By implementing these defaults, organisations prevent the opposite scenario where a user may choose to use a non-recommended (or downright potentially harmful app) as their default in the personal profile, and open the device up to additional security risks. Google states these must be initially configured at provisioning time. That is to say set in the policy applied at the time of enrolment. If being set retrospectively, as would be required for any existing device updating to Android 15, this can be done through the use of allowlists: The default messaging app can be set at any time. To enforce OEM defaults for dialler and browser after set up, this control must be combined with an app allowlist. These do not apply to Android 15's Private Space (discussed below), as these applications should not be present in the Space to begin with. Security & privacy changes # Android 15 additionally introduces a fair few security improvements also, some of which include: Migration of events from logcat to SecurityLog # From 15 we'll start seeing more information provided to SecurityLog. For those who've debugged an Android device under management, unless you're working with the device directly, pulling & reviewing logcat can be a pain. As SecurityLog, along with NetworkLog, can be fetched through the EMM, this offers a much simpler option and ongoing review of the respective logs. The intention is to more closely align with NIAP requirements, and allow for quick review of administrative device changes. In addition, Android adds an event for the backup service being toggled by an admin which will also now be available for admins from 15 when pulling security logs. Improvements to Factory Reset Protection # Though there are no enterprise-specific changes to factory reset protection, I believe it's important to highlight some changes made to how it works within the context of an enterprise device, namely: Enabling OEM unlock in developer settings will no longer deactivate FRP Bypassing the setup wizard, which isn't uncommon for dedicated devices/OEMs, will no longer deactivate FRP. Adding accounts, passwords, and applications will no longer be possible while FRP is active Going forward it will be evermore important to ensure both FRP, and enterprise FRP (wherein organisations set the allowlisted Google accounts), are properly maintained and processes correctly followed for resetting devices, if the EMM does not turn FRP off by default (hi, Omnissa..) A bump to minimum SDK version for installation of apps # As expected, the restriction on installing applications targeting very old versions of Android is getting a bump. In Android 15 it will no longer be possible to install apps targeting API level 23 - Android Marshmallow / 6.0 - or older. Only apps that target Android 7.0 - API level 24 - or later will be permitted. jason@MBP Downloads % adb install app-release.apk Performing Streamed Install adb: failed to install app-release.apk: Failure [INSTALL_FAILED_DEPRECATED_SDK_VERSION: App package must target at least SDK version 24, but found 23] Just as last year, we're talking about applications targeting a version of Android 10+ years old. While some organisations with line-of-business apps that haven't seen an update in half a decade may balk at the idea of getting their applications updated or rewritten, the justification behind this limitation is solid - security. Where apps targeting <6.0 were able to abuse the old permissioning system (pre-runtime!), apps targeting 7.0 are still able to abuse device administrator and similar APIs. This isn't something you want potentially leveraged directly or indirectly on your managed estate. Restrictions on device identifiers for personally-owned devices # From Android 15, applications with the permission android.permission.MANAGE_DEVICE_POLICY_CERTIFICATES will be able to fetch getEnrollmentSpecificId, which is an enrolment-specific, unique device identifier that persists across re-enrolments when done so into the same deployment scenario (i.e. fully managed or personally-owned work profile), by the same vendor agent, into the same enterprise (organisation/bind). It is an alternative to identifiers such as IMEI and serial number, which Google no longer grants access to for applications without the appropriate device or profile owner role, or DELEGATION_CERT_INSTALL via policy, and becomes the default and only option for fetching a unique device identifier for personally-owned work profile devices in future. To be clear - applications in a personally-owned work profile deployment up to now with the delegated permission of DELEGATION_CERT_INSTALL have been able to fetch a device serial number with relative ease, something that defeats the entire purpose of restricting access to the identifiers, considered to be personally identifiable information, in the first place. That loophole is closing. Head's up At time of writing there's a bug in 15 - on the Pixel 9 Pro XL at least - preventing delegated scopes from being retrieved by managed apps within the work profile. It works fine in the parent profile. If you'd like to validate this yourself, here's a snippet to call from within an application: val dpm = context.getSystemService(Context.DEVICE_POLICY_SERVICE) as DevicePolicyManager val delegatedScopes = dpm.getDelegatedScopes(null, context.packageName) Security exceptions for sensors-related permissions # From 15, device admins targeting API level 35, including DPCs and device admin role holders, will begin throwing security exceptions when attempting to set permissions for some sensors-specific permissions, including: Manifest.permission.ACCESS_FINE_LOCATION Manifest.permission.ACCESS_BACKGROUND_LOCATION Manifest.permission.ACCESS_COARSE_LOCATION Manifest.permission.CAMERA Manifest.permission.RECORD_AUDIO Manifest.permission.RECORD_BACKGROUND_AUDIO Manifest.permission.ACTIVITY_RECOGNITION Manifest.permission.BODY_SENSORS The two scenarios where this is expected to happen is: The calling agent is a profile owner, rather than a device owner (so work profile deployments, not fully managed) The agent is a device owned on a fully managed device, but has EXTRA_PROVISIONING_GRANT_OPT_OUT set during the provisioning process. While this has been in place since Android 12, previously this would have silently failed. In future security exceptions will be triggered which should make it easier to debug. New restrictions # It wouldn't be an Android release unless we saw a few new features to manage. Here's the run-down: Content protection policy # The content protection policy offers admin control of a new feature for real-time threat detection within the Google Play Protect arsenal of protections covered in a prior security blog from February. For Pixel devices, the toggle for this is in Settings > Security & privacy > More security & privacy > Scanning for deceptive apps. It is buried deep in Settings. When the configuration is unspecified, currently the respective toggle is off for fully managed devices. Switching to enforced then enables the setting. This is a great approach, sympathetic to the feedback its announcement generated from administrators already frustrated with overbearing Google Play Protect policies that cannot be disabled (full disclosure, I'm generally in favour of GPP, but I'm aware of the problems it causes for some organisations), while allowing its use for organisations that feel they need it. For EMM vendors, this is already present in AMAPI as contentProtectionPolicy under AdvancedSecurityOverrides. Android 15 also introduces the permission android.permission.MANAGE_DEVICE_POLICY_CONTENT_PROTECTION for apps which are not the device or profile owner to be able to interface with this API. Google Play Protect app scanning changes # In a related note, in September 2024 Google made a considerable change that will placate any organisation deploying sideloaded enterprise applications, including those installed via the EMM DPC (agent), internal services, or sideloaded in more traditional ways. These applications will no longer be sent to Google for scanning, and no longer prompt end users to take any action against them unless they are known to Google to be potentially harmful. More information here. Disallow NFC radio # As it says on the tin. If you're thinking "Don't we already have an API for NFC?" Yes we do, but that's to control the beaming of data between devices. This is a full on radio disable and will probably live under DeviceRadioState in AMAPI at some point later. This appears to be a natural progression from the earlier DISALLOW_CHANGE_NEAR_FIELD_COMMUNICATION_RADIO which prevents the turning on/off NFC in settings. eSIM management # eSIM has been given a respectable amount of attention in 15. Here's what's new: Disallow SIM Globally # The API I found earlier in the year appears to be a subset of a larger eSIM management framework being introduced with Android 15. For completeness, as the earlier post was quite light, here's what Disallow SIM Globally actually means: Available for both fully managed and company-owned work profile devices, disallow SIM globally (DISALLOW_SIM_GLOBALLY) is an eSIM restriction to globally prevent the user download of eSIMs to a device. While I earlier assumed it may have been globally disabling cellular, killing the radio and hiding the respective settings, status bar messaging, and so forth (useful particularly for lower-cost tablets that often come with cellular) this is not the case. In my testing, with the restriction enabled I was able to go into settings, begin eSIM setup with the scan of a QR code, and only then did it prevent setup with a generic error message that suggests there's a problem with the eSIM rather than a policy restriction in place: The experience could be improved dramatically here just with the addition of management UI, and preferably earlier in the process of adding an eSIM, also. Expanding 9.0 APIs for eSIM management # More broadly Android 15 introduces eSIM configuration capabilities via EMM. Based on what I've been able to find, eSIM management is directly associated with eSIM subscription management introduced in Android 9.0, and has been expanded in 15 to allow remote configuration via EMM, or the appropriate permission: Starting from Android Build.VERSION_CODES.VANILLA_ICE_CREAM, if the caller has the android.Manifest.permission#MANAGE_DEVICE_POLICY_MANAGED_SUBSCRIPTIONS permission or is a profile owner or device owner, then the downloaded subscription will be managed by that caller. In case the caller is device owner or profile owner of an organization-owned device, switchAfterDownload can be set to true to automatically enable the subscription after download. If the caller is a profile owner on non organization owned device switchAfterDownload should be false otherwise the operation will fail with EMBEDDED_SUBSCRIPTION_RESULT_ERROR. It would appear EMM vendors with either custom DPCs or via AMAPI will be able to lean into this API from 15 to add and remove EUICC subscriptions. Neat. Further, it will even support partial payloads! Providing the device has already been registered with an eSIM on a carrier's SMDP+ server, it will allow the device to reach out to that server, declare itself and get it's eSIM. This has the potential to significantly simplify eSIM management, reducing the number of eSIM configurations necessary for large deployments. Personally-owned device users will be able to remove the configured eSIM, though for company-owned devices, the additional policy DISALLOW_CONFIG_MOBILE_NETWORKS can be set to ensure eSIMs aren't deleted. Disallow assist content # This restriction allows administrators to prevent privileged apps, such as Assistant, from receiving contextual device information. These include screenshots, package names, and more. Useful for admins wishing to reduce the sprawl of information access privileged apps can have. This is scope-specific, so on fully managed devices will apply device-wide, but on profile-enabled devices restricts only to the managed profile. Circle to search # Relatively straightforward, an enterprise API is being introduced to lock down circle to search - one of the most hyped up features I've seen in a long time.. but probably not something organisations want accidentally invoking on dedicated devices while customers try to order a Big Mac! This is a nice continuation of assist content above, limiting the amount of data being sent to Google services. Widget management is back?! # With Android 15, setKeyguardDisabledFeatures has been expanded with widget management to coincide with the re-introduction of lockscreen widgets for tablet devices. At this time it appears to only apply to widgets in managed profiles, with Google explicitly stating: ..the profile owner of an organization-owned managed profile can set KEYGUARD_DISABLE_WIDGETS_ALL which affects the parent user when called on the parent profile. More testing is needed to determine why this isn't available for fully managed devices. To note for wider context, lock screen widgets were removed way back in 5.0 citing, if I remember correctly, low use. With the recent focus on tablets, and Apple adding their own, Google clearly figured they matter again! Other changes and requirements for 15 # Rounding off what's new, here are some additional features that don't fit into the above categories: Platform signed permission management # When a vendor works with an OEM to get their application platform singed, the application is granted all system-level permissions available on the device. As you can imagine, that is an unprecedented level of device access to data and services reserved normally for only the OEM system apps, and Google's preloaded suite of applications. In Android 15, Google is introducing system permission management, allowing OEMs to grant or deny permissions to signed applications that allows for the considerable down-scoping of access of a signed app to only the explicit permissions required to function. This won't apply to system apps bundled with a set of permissions in the OEM system image, but should permissions change in a later system app update, these permissions would also be denied automatically unless allowlisted in the respective system configuration. There's an additional config to allow platform-signed shared UIDs for non-system applications that have additionally previously required access to this. There are new alerts in logging to determine the permissions applications are no longer retaining access to, which vendors should already start looking at today to avoid loss of functionality. Knowing how many enterprise vendors lean on platform signature permissions today (basically most EMMs, several SaaS products, etc), this has the potential to cause headaches as 15 lands on devices, unless OEMs and vendors work together proactively to avoid this. Screen recording improvements # If you're like me and record your screen far too often to demonstrate anything from a device feature to a bug, user guides and more, you'll be pleased to hear the previously Pixel-only feature introduced in Android 14 is coming to the wider ecosystem with the 15 update. Now users can limit screen sharing to just the app they want to show, and no longer fret on the possibility to showing something that may not be appropriate for the context. Continuing the theme of recording, this is not so much an enterprise feature in and of itself explicitly, but Android 15 will alert apps when the screen is being recorded, allowing them to hide contents. I can imagine this might be useful for enterprise applications across the board to bolster DLP (data loss prevention), and based on murmurings in Tech News, Google is testing restrictions in Chrome to prevent sensitive information from being recorded (addresses, card details, passwords, etc). Broader system update visibility # From 15, applications granted the permission android.permission.MANAGE_DEVICE_POLICY_QUERY_SYSTEM_UPDATES will be able to obtain information about a pending system update. This softens the current requirements that an application be a device or profile owner in order to fetch this information. What this doesn't do, unfortunately, is offer any more information about the update(s) available. Today we can see an update is available and that it's a security update. This API needs to be updated to show - build info, size, how long it's been available (not just when first detected), - SPL/Android version All of this is offered either through GOTA, Google's OTA management server many OEMs are encouraged to leverage (some don't of course, consider e-FOTA from Samsung, or HMD's new FOTA platform), or the build fingerprint of the package itself. Check MTE status # Expanding on the options for getting and setting MTE policies in Android 14, in 15 it will now be possible to merely query the current state (evidently something that should have, but didn't, quite make it to the 14 release!) Deeper dedicated device experience management # With Better Together Enterprise, AKA the new customer signup flow, Google is introducing a new provisioning option for dedicated devices, in addition to PERSONAL_USAGE_ALLOWED and PERSONAL_USAGE_DISALLOWED, Google are introducing a third allowPersonalUsage AMAPI enrolment token configuration option of DEDICATED_DEVICE. That alone isn't an Android 15 feature, but an accompanying flag OEMs can set from 15 within the device software declaring it a dedicated device should give many dedicated device-based organisations a reason to take note. Such distinguishing features between knowledge worker devices and the new dedicated devices flag include: Setup Wizard customisation Default restrictions within the Android experience Managing dedicated devices, which have always been treated identically to any other consumer Android device on the market, has been a frustrating experience; devices an end user would never use shouldn't need to configure accounts, access Google Play, deal with all the setup wizard interruptions around privacy callouts and more. I'd really hoped the EDLA licence would have solved a lot of problems, but so many years now after its introduction the differentiation is still minimal from MADA. Fortunately it looks like Google are taking another approach. Unfortunately a few years too late for the almost 5 years I supported dedicated devices on a daily basis, but I look forward to future projects benefiting from these changes. What didn't make it # These didn't make it today, but may pop up in a QPR or future Android version release: Dedicated document preview app # In the earlier Android 15 article I referenced a new mandate for OEMs to include a document viewing app, saying: The absence of a document preview application for managed devices has been quite a noisy complaint from organisations for many years, overshadowed only by missing camera &/ gallery applications. None of these apps have been mandated by Google for the fully managed/work profile user experience, and so the common trend is to see them simply not added. It appears Google changed their mind on this, which is not uncommon across releases by any means. The 4 or so years I spent working on Android hardware I saw many instances where proposals ultimately didn't make it - sometimes due to an internal direction change, sometimes pressure from OEMs. Either way it looks like that has happened here also, so we'll go another year without a dedicated document preview app. Skip adding personal accounts during company-owned work profile provisioning # In the earlier article I referenced a change I interpreted as offering the possibility for organisation admins to set provisioning-time configurations that skip the add-account flow during managed provisioning of a company-owned work profile device. This would have been a small quality-of-life improvement that would shorten down the COPE provisioning time for scenarios where either: users don't wish to immediately add a personal account and complete the full setup of their device, or where devices are perhaps staged elsewhere and sent to users registered and ready to go. Alas, we won't see this in 15. With that said, it has been submitted as a feature request to Google! In future, we may see a provisioning time option similar to allow the skipping of personal setup, perhaps palmed off to deferred setup, or triggered on the first boot after provisioning completes. Why would it be useful? Mostly echoing the above - organisations still pre-provision devices, even those on zero-touch, before sending them out to users in an effort to reduce the hand-holding needed for setting up a device. With the COPE model there are privacy and ethical considerations preventing the setup of a personal profile with a user's account, and obviously skipping the account setup renders the setup process less intuitive, even with deferred setup. Ensuring the work side is sorted, then shipping it out to an end user to add their Google account and go I find quite an enticing option in this and similar scenarios. Disallow Thread Network # At the time of writing, Google developer docs still don't have an entry for the Thread API, but reference it in the UserManager docs as an unlinked entity. At some point the link to UserManager should go to the right place. In the meantime it appears the source for CTS contains a test for this API. From that it's somewhat clear what this API is intended for, and we no longer need to assume: // If the device doesn't support Thread then as long as the user restriction doesn't throw an // exception when setting - we can assume it's fine @RequireFeature("android.hardware.thread_network") @RequiresFlagsEnabled(Flags.FLAG_THREAD_USER_RESTRICTION_ENABLED) If that's too ambiguous, the CTS docs reference the hardware feature android.hardware.thread_network, which additional source commits tie directly to Thread network support. It looks like it'll be a relatively straightforward boolean (on/off) restriction allowing managed devices to interface with thread network devices when it's added to Android at a later date. Did I miss anything? # If I did, you know where to find me.

    Feed has no items.

Brooks Peppin's Blog Managing Windows in the Modern Workplace

Many Miles Away Helping you succeed with end user computing technologies

    Feed has no items.

    Feed has no items.

Sam Akroyd. Thoughts on Tech

  • Workspace ONE UEM Sensors and custom Registry values
    by techhub981158167 on June 10, 2024 at 12:58 pm

    I had a customer enquiry recently where they were looking to pull some custom fields from a device to identify a device location, well at least where it was deployed, as well as come custom tags and other information they associate with a device at the time of deployment. If you have used Workspace ONE … Continue reading Workspace ONE UEM Sensors and custom Registry values →

  • VMware App Volumes Apps on Demand
    by techhub981158167 on January 8, 2024 at 3:26 pm

    There are plenty of articles explaining what VMware App Volumes Apps on Demand are and the benefits, for example https://www.vmware.com/uk/topics/glossary/content/apps-on-demand.html. This video demonstrates how quick and east it is to associate an App Volumes Server with an RDS Host in VMware Horizon and subsequently deliver a package using Apps on Demand.

  • End of Year
    by techhub981158167 on December 20, 2023 at 10:14 am

    When I started this blog and YouTube channel a few years back I never really had a target other than to share any tips, tricks, information and how to for various EUC products. It’s always nice to see the end of year stats and know that people are looking at your content. Diving into the … Continue reading End of Year →

  • The next phase of Workspace ONE UEM Sensors
    by techhub981158167 on December 8, 2023 at 11:14 am

    Earlier this year I wrote a blog article about using ChatGPT to write PowerShell scripts that could be used in Workspace ONE UEM to create Sensors. This works fine, but bear in mind that ChatGPT created PowerShell scripts for me based on best endeavours, there is no guarantee they would work or would not contain … Continue reading The next phase of Workspace ONE UEM Sensors →

  • Workspace ONE UEM and Windows Multi User
    by techhub981158167 on August 23, 2023 at 3:48 pm

    Multi User or Shared Device, if you want to look at it that way, is something that has been supported with VMware Workspace ONE UEM but more so for Mobile Operating Systems rather than Windows. VMware has received feedback from several customers on wanting to be able to support a Windows Multi User use case. … Continue reading Workspace ONE UEM and Windows Multi User →

Thomas Cheng Welcome to my digital home!

VirtuallyUnboxed Lifting the lid on everything virtual

  • End of support for vSphere 6.5.x and 6.7.x
    by virtuallyunboxed on October 20, 2022 at 4:31 pm

    In case you missed it, last week marked the end of general support for vSphere 6.5 and 6.7. This is the same regardless of whether you were using it for data centre services or EUC services like Horizon.

  • Desktop Repurposing v4
    by virtuallyunboxed on October 20, 2022 at 4:23 pm

    This year, myself and Matt Evans joined forced again, along with newcomer, Jonathan D'arcy to review some of the best desktop repurposing tools on the market. As with previous years we reviewed imaging and performance. However, this year we also took a look at the accompanying management solutions.

  • VMware SASE and Cloud Web Security
    by virtuallyunboxed on January 22, 2022 at 3:11 pm

    Let's start with the basics! SASE is a Gartner term and is an abreviation of Secure Access Service Edge. Still not much help right? Well lets start explaining this by looking at how people typically work, espeically remotely, and how their traffic is secured. Most of you that ever work remotely will most likely use a device level VPN. This uses software on your device to create a tunnel into your company data centre and allows you to remotely access internal resources. This is how most companies have done it for many years, and it really dates back to the days when all a companies resources were in their own data centre. Tunnelling all the traffic back into the data centre was the perfect way to reach everything a remote user would need.

  • Workspace ONE UEM and Workspace ONE Access Integration for Hub Services
    by virtuallyunboxed on March 2, 2021 at 4:06 pm

    I know there are a lot of SaaS customers out there who have only been using basic MDM functionality within Workspace ONE. The platform has moved on a lot in the last few years and if you haven't already seen it i strongly suggest you check out hub services. This takes the Workspace ONE agent that is used for device management and adds additional functionality to the application such as a unified app catalogue, people search and a notifications platform to name but a few!

  • Workspace ONE Access FIDO2 integration
    by virtuallyunboxed on February 19, 2021 at 2:33 pm

    As of this month (Feb 2021) All Workspace ONE Access SaaS tenants, now supports FIDO2 as an authentication method. So, I thought i'd put together a short video showing how easy it is to configure it and some different device types using the solution.

Mobile Jon's Blog My WordPress Blog

  • Extending Cloud Native PC Wireless Authentication to Cloud RADIUS
    by MobileJon on March 17, 2025 at 4:43 pm

    This article discusses RADIUSaaS, a cloud-hosted solution for device authentication using EAP-TLS, highlighting its components, including username/password and MAC authentication support. It explains integration with Microsoft Cloud PKI, RadSec for secure communication, and Cisco Meraki. The author emphasizes RADIUSaaS's user-friendly interface and enhanced wireless authentication capabilities.

  • Robopack Elevates Microsoft Intune Application Lifecycle Management
    by MobileJon on March 10, 2025 at 5:33 pm

    Robopack is an innovative product aimed at simplifying application deployment and updates within Microsoft Intune. It enhances management through features like Instant App Deploys, Custom App Settings, and Robopatch for effective patching. The platform promises to streamline the application lifecycle, making it easier for Intune administrators to manage and update apps effortlessly.

  • Troubleshooting and Logging Intune Remediations
    by MobileJon on February 24, 2025 at 4:00 am

    The post discusses the author's experience with Intune Remediations, highlighting the importance of well-crafted remediation scripts and thorough logging. Key topics include proper script writing, local log reviews, and log monitoring within the Intune Console. The author emphasizes an iterative testing approach to enhance script efficacy and reduce troubleshooting efforts.

  • Deep Dive On Wireless Authentication on Cloud Native PCs
    by MobileJon on February 18, 2025 at 5:46 pm

    The transition to Windows 11 has led to Wi-Fi connectivity issues for customers mainly due to outdated authentication methods. This article outlines solutions using modern technologies like Microsoft Intune and NPS, suggesting a shift from legacy protocols to certificate-based authentication for improved network security and access management.

  • Deep Dive into Windows 11 Kiosks Part 2: Advanced
    by MobileJon on January 28, 2025 at 4:32 am

    The article discusses Windows 11 Kiosks, focusing on Shell Launcher and Restricted User Experience. It explains how to build and deploy XML configurations for both features using Microsoft Intune. Shell Launcher allows custom UIs, while Restricted User Experience manages multiple apps in a kiosk-like environment. The content highlights practical applications and deployment tips.

    Feed has no items.

VMware Workspace ONE The un-official subreddit for VMware Workspace ONE. I recently started learning/managing Workspace One for the company I work for, I came to reddit to find others and saw that there wasn’t a community, so I started one. Our discord is here https://discord.gg/Zhr3TqMMf6

  • UEM 2410
    by /u/No_Support1129 on March 24, 2025 at 8:29 pm

    Soooo there's a bug, shocker, I know!! Apparently it's known but I haven't seen anything on it. Device & monitor dashboards don't work at all. Filters on the list view doesn't resolve. Thankfully only in my DEV but I have 48 devices in there. I can only see 7. So irritating that they upgraded my environment knowing this was going on. Whew! I've been hot about it all day. submitted by /u/No_Support1129 [link] [comments]

  • Setting "internet settings" zones, trusted zone etc.
    by /u/Active_Swordfish_660 on March 24, 2025 at 8:08 pm

    This is something we would do in GPO usually. i.e User Configuration > Policies > Administrative Templates > Windows Components > Internet Explorer > Internet Control Panel > Security Page > Site to Zone Assignment List - Enabled Has anyone done this using WS1? submitted by /u/Active_Swordfish_660 [link] [comments]

  • Taking Over Workspace ONE After Years of Misuse – Where Do We Start?
    by /u/Select_Equivalent_23 on March 24, 2025 at 6:46 pm

    Hello everyone, My organization has been using Workspace ONE the wrong way since around 2017. Now that the previous staff have moved on, my team and I are taking over and working to revamp everything to use its full potential. To give you some perspective, we manage about 450 iPads and 50 iPhones along with Apple Business Manager—and we literally just figured out how to log into the Hub app last week. So yeah, we’re pretty much starting from scratch! I’m looking for any advice, documentation, videos, or best practices on setting up Workspace ONE properly. Specifically, we want to: ✅ Understand how to configure everything from the ground up ✅ Set up Active Directory integration (we have Entra available) so users can log into the Hub app ✅ Learn best practices for device management ✅ Eventually expand to managing 60 Windows desktops if we can prove ourselves with mobile Any help, guides, or resources would be greatly appreciated! Thanks in advance! submitted by /u/Select_Equivalent_23 [link] [comments]

  • Zebra Airwatch connector
    by /u/Terrible_Soil_4778 on March 24, 2025 at 2:14 am

    Does anyone has the .exe Zebra Airwatch Connector file? Our Server failed and we cannot recover the file and Zebra is not being very helpful. https://www.zebra.com/us/en/software/printer-software/airwatch-connector.html submitted by /u/Terrible_Soil_4778 [link] [comments]

  • WsONE UEM: iOS homescreen layout payload is not applying
    by /u/GeekgirlOtt on March 23, 2025 at 3:59 pm

    We can not manually drag any app onto the dock using a profile that has no homescreen payload. So then we added a new profile with a homescreen payload and listed safari,camera,mail for the dock. Other payloads in the profile are deploying. Dock is only showing recently used items. Is there an associated setting in Restrictions or somewhere else that needs to be set ? Supervised iOS device on SAAS 24.10. I ctrl+F to search for 'dock' in the documentation for the list of restrictions, and didn't find. submitted by /u/GeekgirlOtt [link] [comments]

  • [Webinar on April 2] Increase the value of your Omnissa deployment with advanced data and automation: powered by Intelligence and Freestyle Orchestrator
    by /u/R_inspired on March 20, 2025 at 3:31 pm

    submitted by /u/R_inspired [link] [comments]

  • Default Organizational Group for iPhones
    by /u/Select_Equivalent_23 on March 19, 2025 at 1:10 pm

    Pre-Enrollment Status for Test iPhone I have a few questions regarding the assignment of profiles and organizational groups to newly enrolled iPhones. I'm testing with an iPhone that I erased to return it to the pre-enrollment state. During setup, I can choose between two existing DEP profiles, but I'm unsure how to add additional profiles to the selection. Additionally, the device is automatically assigned to the top-level Organizational Group (OG), and I don’t know how to change the default OG assignment. While I understand that I can manually move the device to a different OG later, I’ve encountered performance issues in the past when switching OGs due to the number of profile changes that occur. What’s the best way to manage these assignments to avoid delays and ensure a smoother process? Any advice would be greatly appreciated! submitted by /u/Select_Equivalent_23 [link] [comments]

  • Delevoper Options on VseeBox V3 Pro
    by /u/Existing_Hunt_8345 on March 16, 2025 at 2:03 am

    I'm trying to get to developer Options on my Vseebox V3 Pro. I go to build and tap it 7 times and nothing. Can Developer Options be restricted somehow? Maybe there is another way to get there? submitted by /u/Existing_Hunt_8345 [link] [comments]

  • Device Wipe option missing from Device List View
    by /u/ImprovementHopeful30 on March 12, 2025 at 9:34 pm

    Hey all, I've been in WS1 since AirWatch 3.6 and I swear I used to be able to bulk device wipe corporate owned iOS devices. I want to blow these suckers away all the back to hello screen. It's not a bulk management thing either cause I can't even do it for one device. Any thoughts? If I just Delete Device it only enterprise wipes and removes my profiles/apps leaving the device with standard apps. Which also seems odd since these are AMB DEP enrolled devices. I found a link about permissions in some Omnissa documentation but it was dead so if anyone has any thoughts I'd love to hear them. submitted by /u/ImprovementHopeful30 [link] [comments]

  • Can I remove/retire/kill/burn what have you an app and not have WS1 try to remove it from devices?
    by /u/theslats on March 11, 2025 at 10:52 pm

    I need to switch an app from a .msi to an .exe which means I can't upload the new version as a version. Can I retire the previous app without it getting stuck or removed from my devices while the new app deployment goes out? submitted by /u/theslats [link] [comments]

  • New to Intelligence
    by /u/No_Support1129 on March 10, 2025 at 3:36 pm

    New to Intelligence and wondering how other admins use this tool. What reports and dashboards did you create? How are you utilizing this tool? submitted by /u/No_Support1129 [link] [comments]

  • need help please. 3 days to ssl certificate to expire.
    by /u/Impressive-Gas-4630 on March 6, 2025 at 9:19 pm

    we have uem,uag,access servers. how we renew the public certificate? i can't find any help from the support and the documents. submitted by /u/Impressive-Gas-4630 [link] [comments]

  • [March 26th] Omnissa Tech Deep Dive: What's new with Windows software distribution?
    by /u/R_inspired on March 6, 2025 at 2:04 pm

    submitted by /u/R_inspired [link] [comments]

  • Profiles do not update on Native App removal or addition
    by /u/liamWill06 on March 5, 2025 at 9:26 pm

    Under Resources => Apps => Native, usually when I remove or add a new version of a given app, the associated profiles are automatically updated on all associated devices so that the new version can be installed. Additionally, removing an existing version automatically dispatches a remove request to all devices running that version of the app so that old/obsolete versions are not permitted to remain in circulation. This has worked just fine for us for years now, but starting sometime last week we started noticing a strange issue with this. Now whenever we remove or add a new version, the profiles are not updated at all. The system will continue to monitor the devices but no remove or update requests of any kind are automatically dispatched. Furthermore, navigating to Devices => List View and searching for one of the affected devices shows that they are still assigned the previous version of the profile before the app changes, with no indication that anything is wrong and with the wrong options available for what apps can be installed or not. The only way I have found to fix this is to go through all the affected devices and request a query directly from the dashboard. This seems to update the profile to the correct version with all the expected changes reflected on the device, but this is a manual process that can get very tedious depending on the number of tablets that must be addressed. This is very troubling, as we are reliant on this process to efficiently distribute updates to our app. If anyone might know what could be causing this and how to fix it then we would greatly appreciate any insight. This problem only seemed to start about a week ago, I think somewhere around the time they instituted some UI updates to the dashboard, but we are uncertain of how this could be affecting anything or why. submitted by /u/liamWill06 [link] [comments]

  • MEM configuration with M365
    by /u/Terrible_Sand62 on March 5, 2025 at 3:36 am

    How did you authenticate powershell with exchange server ? Did you use an admin user credentials or service account? Which authentication method did you use ? kerbose/NLTM/Modern.. submitted by /u/Terrible_Sand62 [link] [comments]

  • Old Android device locked
    by /u/vlone59 on March 4, 2025 at 9:02 pm

    Hi all, I just joined the team that manages mobile devices in my company. They have a bunch of old galaxy tabs that I can get because it is locked and old. I would like to use them again bit I'm stuck Tablets are Galaxy Tab active 2 running android 9. All tabs were enrolled by WS1 with Knox policies enabled. WS1 servers were migrated between the enrollment and now, and I think all certificates are now expired. The tabs boots directly to a workspace locked screen and cannot go anywhere from there. The recovery reset is locked, download mode is locked and the emergency dialer trick is not working. By connecting a keyboard and pressing alt + F4 I can kill the workspace screen and get to one ui launcher. But there, knox policies blocks me from doing anything. The only app that is launching is the VMWare Hub 20 The unenroll button is not displayed and the hub cannot connect to he on premise WS1 server (the server URL displayed in the hub is correct) Every certificate seems expired (judging by the CA name which belongs to an old name of our company and is not used anymore) Is there anyway to get it unenrolled or get it communicate with the server again ? The hub keeps saying " connection problem" I cannot uninstall the hub or get to any settings, including app information. The only things I can do is : Launching the camera Launching the gallery Launching the Hub Everything else is locked Thank you in advance for your advice submitted by /u/vlone59 [link] [comments]

  • Intelligent Hub Migration from Legacy Catalog
    by /u/Select_Equivalent_23 on March 3, 2025 at 2:15 pm

    My organization is still using the Legacy Catalog app for pushing out apps to users and that's how users still download their apps. I need some advice on how to migrate to Intelligent Hub because we are not using it at all at the moment. A first step would be how to sign into the Hub app because we still can't even do that. Any advice is much appreciated. Thank you! submitted by /u/Select_Equivalent_23 [link] [comments]

  • How to Require Updates Without Prompting Unsupported Devices?
    by /u/SpurgtFuglen on March 3, 2025 at 9:46 am

    I'm managing an iOS update policy and want to require users to update their devices. However, I don't want users with devices that cannot receive the latest iOS update to be repeatedly prompted. The issue is that if I enforce "latest iOS version" as a requirement, older devices that are no longer eligible for that update will still get spammed with update notifications. Is there a way to configure an update policy that only requires updates for devices that can update, while exempting those that are stuck on their last supported version? submitted by /u/SpurgtFuglen [link] [comments]

  • 2412 UAG Workspace one
    by /u/Beautiful-Ice3715 on March 2, 2025 at 1:43 pm

    Hi Everyone, The omnissa has changed UAG OS type , photon os to Alma linux. Actually I dont know how can I reset forget root password with the new version. Is anyone tested that ? submitted by /u/Beautiful-Ice3715 [link] [comments]

  • Please help, In-active devices are removed from the console after 7 days.
    by /u/More_Spite6755 on February 28, 2025 at 4:38 am

    Could you please help me On-prem version 23.10.0.39 Most endpoint is Samsung smartphone Currently, devices enrolled in the system are automatically removed after 7 days of inactivity. Is there a way to change this setting or prevent the automatic removal? submitted by /u/More_Spite6755 [link] [comments]

The Support Insider VMware Support News, Alerts, and Announcements

  • Simpler Licensing with VMware vSphere Foundation and VMware Cloud Foundation 5.1.1
    by Kelcey Lemon on March 21, 2024 at 5:28 pm

    Tweet VMware has been on a journey to simplify its portfolio and transition from a perpetual to a subscription model to better serve customers with continuous innovation, faster time to value, and predictable investments. To that end, VMware recently introduced a simplified product portfolio that consists of two primary offerings: VMware Cloud Foundation, our flagship … Continued The post Simpler Licensing with VMware vSphere Foundation and VMware Cloud Foundation 5.1.1 appeared first on VMware Support Insider.

  • VMware Skyline Advisor Pro Proactive Findings – January 2024 Edition
    by James Walker on January 24, 2024 at 11:16 am

    Tweet VMware Skyline Advisor Pro releases new proactive Findings every month. Findings are prioritized by trending issues in VMware Technical Support, issues raised through post escalation review, security vulnerabilities, issues raised from VMware engineering, and nominated by customers. For the month of January, we released 60 new Findings. Of these, there are 37 Findings based … Continued The post VMware Skyline Advisor Pro Proactive Findings – January 2024 Edition appeared first on VMware Support Insider.

  • Skyline Advisor Pro: Introducing Inventory Export Reports
    by Kelcey Lemon on January 16, 2024 at 12:00 pm

    Tweet You’ve asked for the ability to export inventory information, including licensing, and we’ve listened. The Skyline Team is proud to introduce this highly requested feature, Inventory Export Reports. Inventory Export Reports allow you to generate reports on your inventory, licensing, and configuration data. These reports can help you to identify potential problems, track changes … Continued The post Skyline Advisor Pro: Introducing Inventory Export Reports appeared first on VMware Support Insider.

  • VMware Skyline Advisor Pro Proactive Findings – December 2023 Edition
    by James Walker on December 15, 2023 at 6:56 pm

    Tweet VMware Skyline Advisor Pro releases new proactive Findings every month. Findings are prioritized by trending issues in VMware Technical Support, issues raised through post escalation review, security vulnerabilities, issues raised from VMware engineering, and nominated by customers. For the month of December, we released 56 new Findings. Of these, there are 35 Findings based … Continued The post VMware Skyline Advisor Pro Proactive Findings – December 2023 Edition appeared first on VMware Support Insider.

  • VMware Skyline Advisor Pro: Proactive and Diagnostic Findings Demystified
    by Kelcey Lemon on December 13, 2023 at 3:07 pm

    Tweet While supporting VMware Explore 2023 in Barcelona, a customer asked me, “What’s the difference between Proactive Findings and Diagnostic Findings in Skyline Advisor Pro and how are each one produced?” So, I’d like to take this moment to elaborate more on my original blog that introduced Diagnostic Findings. Proactive Findings Proactive Findings are potential … Continued The post VMware Skyline Advisor Pro: Proactive and Diagnostic Findings Demystified appeared first on VMware Support Insider.

  • VMware Skyline Advisor Pro Proactive Findings – October 2023 Edition
    by James Walker on October 27, 2023 at 4:33 pm

    Tweet VMware Skyline Advisor Pro releases new proactive Findings every month. Findings are prioritized by trending issues in VMware Technical Support, issues raised through post escalation review, security vulnerabilities, issues raised from VMware engineering, and nominated by customers. For the month of October, we released 39 new Findings. Of these, there are 30 Findings based … Continued The post VMware Skyline Advisor Pro Proactive Findings – October 2023 Edition appeared first on VMware Support Insider.

  • From upgrading vSphere to troubleshooting issues with Tanzu Kubernetes Grid: Top 10 VMware Tanzu Knowledge Base Articles in September 2023.
    by Marcela Gleixner on October 11, 2023 at 12:18 pm

    From upgrading vSphere to troubleshooting issues with Tanzu Kubernetes Grid: Top 10 VMware Tanzu Knowledge Base Articles in September 2023. The post From upgrading vSphere to troubleshooting issues with Tanzu Kubernetes Grid: Top 10 VMware Tanzu Knowledge Base Articles in September 2023. appeared first on VMware Support Insider.

  • 10 most popular KB articles in September 2023, for VMware Tanzu Application Service, BOSH and more.
    by Marcela Gleixner on October 9, 2023 at 9:54 pm

    10 most popular KB articles in September 2023, for VMware Tanzu Application Service, BOSH and more. The post 10 most popular KB articles in September 2023, for VMware Tanzu Application Service, BOSH and more. appeared first on VMware Support Insider.

  • Top 10 Most Popular Knowledge Articles for Horizon, WorkspaceONE, End User Computing (EUC), Personal Desktop for September, 2023   
    by Jamie Gravatte on October 6, 2023 at 4:31 pm

    Tweet Get answers and solutions instantly by using VMware’s Knowledge Base (KB) articles to solve known issues. Whether you’re looking to improve your productivity, troubleshoot common issues, or simply learn something new, these most used and most viewed knowledge articles are a great place to start.   Here are the top 5 most viewed KB articles … Continued The post Top 10 Most Popular Knowledge Articles for Horizon, WorkspaceONE, End User Computing (EUC), Personal Desktop for September, 2023    appeared first on VMware Support Insider.

  • Top 10 Most Popular Knowledge Articles for HCX, SaaS, EPG Emerging Products Group for September, 2023   
    by Jamie Gravatte on October 5, 2023 at 2:26 pm

    Tweet Get answers and solutions instantly by using VMware’s Knowledge Base (KB) articles to solve known issues. Whether you’re looking to improve your productivity, troubleshoot common issues, or simply learn something new, these most used and most viewed knowledge articles are a great place to start.   Here are the top 5 most viewed KB articles … Continued The post Top 10 Most Popular Knowledge Articles for HCX, SaaS, EPG Emerging Products Group for September, 2023    appeared first on VMware Support Insider.