The Community

Stay up to date…

VMware End-User Computing Blog Bringing you the latest VMware EUC news, trends and product innovations.

Adam Matthews Technology // IAM // EUC // Random Rubbish

  • I asked ChatGPT to write me a bash script, and it worked (mostly), why do I need to know how to...
    by adam on December 18, 2022 at 11:12 pm

    By now, ChatGPT has become pretty well known ( as of 18th Dec 2022). I’ve messed around with basic questions, but today I wanted to start to write a script that I could use with “OverSight” on Mac (https://objective-see.org/products/oversight.html). When you turn on your camera/mic, it can fire off a script with arguments. In this … Continue reading "I asked ChatGPT to write me a bash script, and it worked (mostly), why do I need to know how to code?"

  • VMware ESXi – How to Remove an NFS Share that’s ‘In Use’
    by adam on December 14, 2022 at 11:35 am

    I recently moved house, and as part of that a few things on my network changed. My NAS (A Synolofy DS8J) changed it’s IP Address. This caused an issue when ESXi was trying to get hold of the datastore. So, now this needs to be removed and replaced – I came across this error: After … Continue reading "VMware ESXi – How to Remove an NFS Share that’s ‘In Use’"

  • Easily Automate your Lab with the vCenter API
    by adam on February 14, 2022 at 6:00 pm

    Learn how to use Python to call the VMware vCenter API to Start and Suspend Virtual Machines easily, and use Crontab to define the times it runs.

  • Quickly Compress Video Files on macOS
    by adam on January 26, 2022 at 11:29 am

    When you record your videos with Quicktime and you end up with 1.7 GB of a file, how do you shrink that?! I’ve been using this process for a couple of years now to optimise the output size of my demo videos, to make it easier to share them in presentations, and to keep my … Continue reading "Quickly Compress Video Files on macOS"

  • WordPress – How to fix Jetpack connection errors, Fonts and Icons showing as squares with NGINX
    by adam on March 5, 2021 at 5:24 pm

    I recently migrated https://blog.eucse.com/blog from running on Apache to Nginx. I found it helped a lot with utilization and speed (combined with a few more tweaks), but one thing I noticed after was Jetpack wouldn’t load correctly, and some fonts and icons were showing as squares. See examples of what I was seeing below: Resolution … Continue reading "WordPress – How to fix Jetpack connection errors, Fonts and Icons showing as squares with NGINX"

Arsen Bandurian: Technical Blog Digital Workspace, End User Computing, Enterprise Mobility, AutoID, WLANs, OSes and other technical stuff I happen to work with

  • Check if a Microsoft Form comes from a trusted source
    by apcsb on November 6, 2023 at 10:14 am

    When you open a Microsoft Form asking you for some sensitive data, do you know where will your data land? Could it be phishing? Read on to find out… Recently, I have received an email at work asking me to fill out a form with some of sensitive personal details (voluntary disclosure).  I don’t mind... Continue Reading →

  • Enhancing Windows Update Catalog metadata Accessibility
    by apcsb on September 11, 2023 at 7:30 am

    Microsoft has recently released a major update to the Windows Update catalog back-end, adding crucial information such as CVEs (Common Vulnerabilities and Exposures) addressed by the update and the CVE Score directly info API. This information is essential for Threat and Vulnerability Management decisions as well as Patch management and many organizations pay $$ for... Continue Reading →

  • Quickly validate and enable manual application uninstall via Intune Company Portal using Graph API
    by apcsb on August 3, 2023 at 7:04 am

    I am back and the titles are getting longer! If you are an Intune admin, you will probably be happy to know that one of the most required features has landed: Uninstall Win32 and Microsoft store apps using the Windows Company Portal. One thing you need to be aware of, is that this feature is... Continue Reading →

  • Building a custom Windows Update Report p1: Parsing HTML via PowerShell on modern systems (no IE)
    by apcsb on July 28, 2022 at 7:30 am

    Wow, it’s been a while! A customer of mine recently wanted a detailed report that should include info such as how many weeks is the Windows on the machine behind the latest available Security Update. We’ve found to a way to combine Intune Data Warehouse and PowerBI to pull data that allows to identify the... Continue Reading →

  • A case of OneDrive Personal Vault not coming up (0x8031000a, MDM, GPO and BitLocker)
    by apcsb on March 18, 2022 at 6:23 pm

    Today I wanted to enable the Personal Vault feature on my Home PC. While following the wizard I got an error 0x8031000a “Your organization requires your device to join the domain before you can use the Personal Vault”. What does this have to do with MDM. GPO and BitLocker troubleshooting? Here’s some quick Friday entertainment!... Continue Reading →

  • The Android Management API doesn't support pulling managed properties (config) from app tracks....
    by Jason Bayton on April 23, 2025 at 12:00 am

    I've had a use case thrust upon me this week, something I hadn't really paid much attention to as I considered and assumed it to be basic functionality. But wouldn't you know? Nope! If you're one of an increasing number of organisations trying to get to grips with Google Play's app tracks, you'll likely already understand the perceived benefits: Multiple application versions through one app listing in Google Play Customisable tracks for easy identification and naming alignment with internal processes Direct access to said tracks via EMM policy for managed devices All the benefits of Google Play's infrastructure for testing and debugging development builds It's handy, right? The alternative is creating multiple app listings, which can - depending on app visibility - do anything from trigger Play's Repetitive Content Policy to add more workload and management overhead in building, uploading, and maintaining multiple applications on the Play Store (obviously can be countered by CI/CD, but that's not the point). Unfortunately one of the limitations with app tracks, that wouldn't be there if using multiple Play Store listings, is the visibility of managed configuration. Circling back to the use case: A customer has successfully had their ear bent to the benefits of managed config for configuring their application(s) out in the wild, and with quite a robust QA process, has historically had multiple versions of an application being deployed to devices across their estate in tandem as part of it. In onboarding to NinjaOne MDM, with AMAPI (AMAPI still doesn't support APK deployment as of April 2025), the obvious route for this workflow was via app tracks - this is also considering additional requirements not fully described here. All had been well until it came time to test the managed config. The app track was selected, the application version landed on-device, but managed configs remained empty. Why? { "name": "enterprises/xxxx/applications/com.applauncher", "title": "App Launcher", "appTracks": [ { "trackId": "4620480462718573", "trackAlias": "Dev" } ], "playStoreUrl": "https://play.google.com/store/apps/details?id=com.applauncher", "distributionChannel": "PRIVATE_GOOGLE_HOSTED", "appPricing": "FREE", "minAndroidSdkVersion": 31, "updateTime": "2025-01-17T20:51:47.764Z", "availableCountries": [ "AD", ... "ZM", "ZW" ], "appVersions": [ { "versionString": "1.33", "versionCode": 33, "trackIds": [ "4620480462718573" ] }, { "versionString": "1.6", "versionCode": 6, "production": true } ], "fullDescription": "App Launcher" } Notice anything missing in the above applications.get via AMAPI? managedProperties is absent. Despite being available in the track being pushed to test devices, the applications.get API endpoint will only return on PRODUCTION where at this time no managed properties were defined. Here's an example of what could be shown in the above, as taken from my application: "managedProperties": [ { "key": "startPath", "type": "STRING", "title": "Application start page", "description": "Set the page the application relative to the domain. Default is /, so to start on the Android docs page input /android.", "defaultValue": "/" } ], I'm sure Google could fix this by adding another request parameter for trackID (alongside name and languageCode as shown here) but today they don't. OK, so how can this be addressed? # As ever I'll focus on AMAPI here, Play EMM API vendors have a lot more freedom with their custom DPCs to integrate this as desired. When building your AMAPI policy, managed configurations form part of the applications payload, and look something like this - { "installType": "PREINSTALLED", "packageName": "com.applauncher", "autoUpdateMode": "AUTO_UPDATE_MODE_UNSPECIFIED", "accessibleTrackIds": "4620480462718573", "managedConfiguration": { "payment_gateway_url": "https:\/\/bbc.co.uk" }, "defaultPermissionPolicy": "PERMISSION_POLICY_UNSPECIFIED" }, Typically, an EMM will take one of two approaches to managed configurations: Use the managed configuration iFrame, which generates the restrictions form.. within an iFrame. This then returns an ID to the policy. Build a form dynamically from the managedProperties of the applications.get API call - this is my preferred route as it's far more flexible. If the EMM is using option 1, it becomes more difficult to achieve the objective as it would require the clearing of the ID and a full resubmission of MC via managedConfiguration. If EMMs don't clear the ID first, they will be met with an error 400 on policy save, despite the documentation clearly stating ID will be ignored: The managed configurations template for the app, saved from the managed configurations iframe. This field is ignored if managedConfiguration is set. Since EMMs use the iFrame for simplicity, this is less likely to happen. For option 2, as above there's a lot more flexibility. The vendor will have a configuration form (or the concepts of one, Intune) which will dynamically generate the appropriate inputs based on the PRODUCTION track applications.get command the EMM performs. But they don't have to do this. An EMM vendor could add either a custom configuration form, or a JSON editor directly, like that of Intune, which would allow the editing and adding of configurations as desired. Now when an application is known to have managed properties set in an app track version, even if the production version doesn't have anything to generate a form against, the managed config JSON can still be added to the policy, and will be sent down to the application regardless where it will apply successfully. Like this: "managedConfiguration": { "payment_gateway_url": "https:\/\/bbc.co.uk" } To summarise # If a policy can be edited via a JSON/custom config editor, it's simple and straightforward to obtain the restrictions from the application and input them under managed configurations manually rather than leaning on the EMM to build the configuration form. If the EMM doesn't offer this, and equally can't provide access to an API to allow similar, then it may be worth raising it as a feature request. Get in touch if you've any questions on this!

  • The Android Management API doesn't support pulling managed properties (config) from app tracks....
    by Jason Bayton on April 23, 2025 at 12:00 am

    I've had a use case thrust upon me this week, something I hadn't really paid much attention to as I considered and assumed it to be basic functionality. But wouldn't you know? Nope! If you're one of an increasing number of organisations trying to get to grips with Google Play's app tracks, you'll likely already understand the perceived benefits: Multiple application versions through one app listing in Google Play Customisable tracks for easy identification and naming alignment with internal processes Direct access to said tracks via EMM policy for managed devices All the benefits of Google Play's infrastructure for testing and debugging development builds It's handy, right? The alternative is creating multiple app listings, which can - depending on app visibility - do anything from trigger Play's Repetitive Content Policy to add more workload and management overhead in building, uploading, and maintaining multiple applications on the Play Store (obviously can be countered by CI/CD, but that's not the point). Unfortunately one of the limitations with app tracks, that wouldn't be there if using multiple Play Store listings, is the visibility of managed configuration. Circling back to the use case: A customer has successfully had their ear bent to the benefits of managed config for configuring their application(s) out in the wild, and with quite a robust QA process, has historically had multiple versions of an application being deployed to devices across their estate in tandem as part of it. In onboarding to NinjaOne MDM, with AMAPI (AMAPI still doesn't support APK deployment as of April 2025), the obvious route for this workflow was via app tracks - this is also considering additional requirements not fully described here. All had been well until it came time to test the managed config. The app track was selected, the application version landed on-device, but managed configs remained empty. Why? { "name": "enterprises/xxxx/applications/com.applauncher", "title": "App Launcher", "appTracks": [ { "trackId": "4620480462718573", "trackAlias": "Dev" } ], "playStoreUrl": "https://play.google.com/store/apps/details?id=com.applauncher", "distributionChannel": "PRIVATE_GOOGLE_HOSTED", "appPricing": "FREE", "minAndroidSdkVersion": 31, "updateTime": "2025-01-17T20:51:47.764Z", "availableCountries": [ "AD", ... "ZM", "ZW" ], "appVersions": [ { "versionString": "1.33", "versionCode": 33, "trackIds": [ "4620480462718573" ] }, { "versionString": "1.6", "versionCode": 6, "production": true } ], "fullDescription": "App Launcher" } Notice anything missing in the above applications.get via AMAPI? managedProperties is absent. Despite being available in the track being pushed to test devices, the applications.get API endpoint will only return on PRODUCTION where at this time no managed properties were defined. Here's an example of what could be shown in the above, as taken from my application: "managedProperties": [ { "key": "startPath", "type": "STRING", "title": "Application start page", "description": "Set the page the application relative to the domain. Default is /, so to start on the Android docs page input /android.", "defaultValue": "/" } ], I'm sure Google could fix this by adding another request parameter for trackID (alongside name and languageCode as shown here) but today they don't. OK, so how can this be addressed? # As ever I'll focus on AMAPI here, Play EMM API vendors have a lot more freedom with their custom DPCs to integrate this as desired. When building your AMAPI policy, managed configurations form part of the applications payload, and look something like this - { "installType": "PREINSTALLED", "packageName": "com.applauncher", "autoUpdateMode": "AUTO_UPDATE_MODE_UNSPECIFIED", "accessibleTrackIds": "4620480462718573", "managedConfiguration": { "payment_gateway_url": "https:\/\/bbc.co.uk" }, "defaultPermissionPolicy": "PERMISSION_POLICY_UNSPECIFIED" }, Typically, an EMM will take one of two approaches to managed configurations: Use the managed configuration iFrame, which generates the restrictions form.. within an iFrame. This then returns an ID to the policy. Build a form dynamically from the managedProperties of the applications.get API call - this is my preferred route as it's far more flexible. If the EMM is using option 1, it becomes more difficult to achieve the objective as it would require the clearing of the ID and a full resubmission of MC via managedConfiguration. If EMMs don't clear the ID first, they will be met with an error 400 on policy save, despite the documentation clearly stating ID will be ignored: The managed configurations template for the app, saved from the managed configurations iframe. This field is ignored if managedConfiguration is set. Since EMMs use the iFrame for simplicity, this is less likely to happen. For option 2, as above there's a lot more flexibility. The vendor will have a configuration form (or the concepts of one, Intune) which will dynamically generate the appropriate inputs based on the PRODUCTION track applications.get command the EMM performs. But they don't have to do this. An EMM vendor could add either a custom configuration form, or a JSON editor directly, like that of Intune, which would allow the editing and adding of configurations as desired. Now when an application is known to have managed properties set in an app track version, even if the production version doesn't have anything to generate a form against, the managed config JSON can still be added to the policy, and will be sent down to the application regardless where it will apply successfully. Like this: "managedConfiguration": { "payment_gateway_url": "https:\/\/bbc.co.uk" } To summarise # If a policy can be edited via a JSON/custom config editor, it's simple and straightforward to obtain the restrictions from the application and input them under managed configurations manually rather than leaning on the EMM to build the configuration form. If the EMM doesn't offer this, and equally can't provide access to an API to allow similar, then it may be worth raising it as a feature request. Get in touch if you've any questions on this!

  • Hands-on with CVE-2025-22442, a work profile sideloading vulnerability affecting most Android...
    by Jason Bayton on April 13, 2025 at 12:00 am

    Mr. Cowell made me aware of a Medium article by Bastien Bobe, field CTO at Lookout, this week. His article gave me a good overview of a vulnerability discovered by Alan Zaccardelle that I'd previously not heard about. I'd encourage reading the linked article above for the overview and demo video of the vulnerability, but in a nutshell the issue is as follows: During work profile setup, there's a temporary state as the profile initialises where no policies are applied. It's too early for organisational policy to enforce (in which sideloading is always prevented by default) and there's no default policy in place on Android's side. The work profile is wide open. This means if a user has developer settings enabled, USB debugging turned on, and the device connected up to a computer, applications can be sideloaded via ADB. For those more advanced, a script can be written to check for the presence of the work profile, and immediately adb install package.apk as many apps as desired until continuing on to the point of registration/enrolment and corporate policy application. Here's a video of my own tinkering (I don't pause the process, so policy can be seen blocking further installs), and I'll continue the article below:

    What versions of Android are in scope? # Pretty much all Android versions going back 10+ years. Android 16 beta 3 is already patched, so 16 will be the first release in recent times to launch without it. For Android 12-15, a patch has been provided in April's SPL. Everything prior to that is for the respective OEMs to find and fix themselves (though running Android 11 or earlier today comes with many more risks than just this, if not manually maintained by the OEM). What are the ramifications? # The clear risk is the presence of unauthorised applications in the work profile, and the potential for data leakage through them. The entire point of the work profile is to isolate corporate apps and data in a separately encrypted and siloed environment; allowing unauthorised applications can effectively bridge the cross-profile divide, and this is quite obviously bad. Unlike Bastien's take, I'm less concerned about malicious, or Potentially Harmful Applications (PHAs) being a risk, as despite his claim, Google Play Protect scans over 200 billion applications a day across certified Android devices globally, including at-least daily checks for known bad applications, and real-time checks of non-Google Play installed applications. Obviously AOSP doesn't benefit from this, but it's a safe assumption most work profile deployments are using certified devices. So this: By design, MDM won’t be able to detect malicious or unwanted apps in the work profile Is misleading. While MDM isn't necessarily the on-device engine scanning apps (that is GPP), Android's built-in protections work well with, and are enforced by, MDM. Of course vendors like Ivanti also have MTD built in, in which case the MDM will be able to detect these apps directly, in addition to GPP. Suggesting unwanted apps can run amok on the other hand is a fair claim, and data leakage is a concern. What can organisations do to protect themselves? # It just so happens if your EMM leverages the Android Management API and is not Intune, you don't have to do anything. Within a few minutes, as shown by my video above, AMAPI removes any unauthorised applications; arguably before these apps could really get much - if any - data. Why not Intune? # Microsoft, despite being the AMAPI for other use cases, uses Company Portal (custom DPC) with work profile devices, though they may apparently be moving over #soon. As such they do not benefit from the AMAPI behaviour that automatically removes unauthorised apps, and these devices are susceptible when using Intune also. What about non-AMAPI platforms? # If you're an Omnissa (Airwatch/WS1), SOTI or Ivanti (MobileIron) house, or other custom DPC platform, organisations have to be vigilant; keeping tabs on installed applications for work profile devices and locating outliers as they may appear. Although Bastien says: If you don’t have an MTD application deployed in your work profile, you won’t see anything and the malicious user can exfiltrate data for years… This is also misleading. MTD will make things exponentially easier/faster to detect anomalies, but many MDMs show installed applications within application inventories synced from devices. While there may be gaps in this capability across the ecosystem, it's a common feature. While this CVE is active across an estate, taking the time to pour through application inventories synced up could save a lot of hassle later on. This could potentially even be done via automated reports and some basic scripting through a vendor's APIs. Other things you can do? Make sure Google Play Protect is enforced. It'll be enabled, but users will have the ability to adjust settings if not enforced. You can fix that. Build blocklists of known troublesome apps Magisk, SMS Backup & Restore, Dropbox, Seal, etc, etc - build out your lists of known apps to block, and if a user tries to sideload, these will be removed even if the platform isn't AMAPI. Prevent installation from unknown sources That won't technically help to prevent this, but protects an organisation against threats generally. See Why you shouldn't install apps from unknown sources. Or invest in an MTD # The linked article is obviously very heavily biased towards the benefits of MTD, but speaking without bias, I'm all for the additional security on mobile devices providing the solution isn't just a glorified antivirus, as these are generally ineffective in Android - doing little, if anything, more than Google Play Protect. A full-featured MTD can help monitor not only applications, but network traffic, help prevent phishing/smishing) and much more. And for what it's worth, I think Lookout is a great option for this. Here are some considerations I've written previously that should still be relevant. Has this affected you? # I'd very much like to understand the potential impact this CVE has had, or will have, now that it's public and not universally patched. Are you seeing applications showing up in reports you don't expect? How are you handling it? Get in touch, if desired!

  • Hands-on with CVE-2025-22442, a work profile sideloading vulnerability affecting most Android...
    by Jason Bayton on April 13, 2025 at 12:00 am

    Mr. Cowell made me aware of a Medium article by Bastien Bobe, field CTO at Lookout, this week. His article gave me a good overview of a vulnerability discovered by Alan Zaccardelle that I'd previously not heard about. I'd encourage reading the linked article above for the overview and demo video of the vulnerability, but in a nutshell the issue is as follows: During work profile setup, there's a temporary state as the profile initialises where no policies are applied. It's too early for organisational policy to enforce (in which sideloading is always prevented by default) and there's no default policy in place on Android's side. The work profile is wide open. This means if a user has developer settings enabled, USB debugging turned on, and the device connected up to a computer, applications can be sideloaded via ADB. For those more advanced, a script can be written to check for the presence of the work profile, and immediately adb install package.apk as many apps as desired until continuing on to the point of registration/enrolment and corporate policy application. Here's a video of my own tinkering (I don't pause the process, so policy can be seen blocking further installs), and I'll continue the article below:

    What versions of Android are in scope? # Pretty much all Android versions going back 10+ years. Android 16 beta 3 is already patched, so 16 will be the first release in recent times to launch without it. For Android 12-15, a patch has been provided in April's SPL. Everything prior to that is for the respective OEMs to find and fix themselves (though running Android 11 or earlier today comes with many more risks than just this, if not manually maintained by the OEM). What are the ramifications? # The clear risk is the presence of unauthorised applications in the work profile, and the potential for data leakage through them. The entire point of the work profile is to isolate corporate apps and data in a separately encrypted and siloed environment; allowing unauthorised applications can effectively bridge the cross-profile divide, and this is quite obviously bad. Unlike Bastien's take, I'm less concerned about malicious, or Potentially Harmful Applications (PHAs) being a risk, as despite his claim, Google Play Protect scans over 200 billion applications a day across certified Android devices globally, including at-least daily checks for known bad applications, and real-time checks of non-Google Play installed applications. Obviously AOSP doesn't benefit from this, but it's a safe assumption most work profile deployments are using certified devices. So this: By design, MDM won’t be able to detect malicious or unwanted apps in the work profile Is misleading. While MDM isn't necessarily the on-device engine scanning apps (that is GPP), Android's built-in protections work well with, and are enforced by, MDM. Of course vendors like Ivanti also have MTD built in, in which case the MDM will be able to detect these apps directly, in addition to GPP. Suggesting unwanted apps can run amok on the other hand is a fair claim, and data leakage is a concern. What can organisations do to protect themselves? # It just so happens if your EMM leverages the Android Management API and is not Intune, you don't have to do anything. Within a few minutes, as shown by my video above, AMAPI removes any unauthorised applications; arguably before these apps could really get much - if any - data. Why not Intune? # Microsoft, despite being the AMAPI for other use cases, uses Company Portal (custom DPC) with work profile devices, though they may apparently be moving over #soon. As such they do not benefit from the AMAPI behaviour that automatically removes unauthorised apps, and these devices are susceptible when using Intune also. What about non-AMAPI platforms? # If you're an Omnissa (Airwatch/WS1), SOTI or Ivanti (MobileIron) house, or other custom DPC platform, organisations have to be vigilant; keeping tabs on installed applications for work profile devices and locating outliers as they may appear. Although Bastien says: If you don’t have an MTD application deployed in your work profile, you won’t see anything and the malicious user can exfiltrate data for years… This is also misleading. MTD will make things exponentially easier/faster to detect anomalies, but many MDMs show installed applications within application inventories synced from devices. While there may be gaps in this capability across the ecosystem, it's a common feature. While this CVE is active across an estate, taking the time to pour through application inventories synced up could save a lot of hassle later on. This could potentially even be done via automated reports and some basic scripting through a vendor's APIs. Other things you can do? Make sure Google Play Protect is enforced. It'll be enabled, but users will have the ability to adjust settings if not enforced. You can fix that. Build blocklists of known troublesome apps Magisk, SMS Backup & Restore, Dropbox, Seal, etc, etc - build out your lists of known apps to block, and if a user tries to sideload, these will be removed even if the platform isn't AMAPI. Prevent installation from unknown sources That won't technically help to prevent this, but protects an organisation against threats generally. See Why you shouldn't install apps from unknown sources. Or invest in an MTD # The linked article is obviously very heavily biased towards the benefits of MTD, but speaking without bias, I'm all for the additional security on mobile devices providing the solution isn't just a glorified antivirus, as these are generally ineffective in Android - doing little, if anything, more than Google Play Protect. A full-featured MTD can help monitor not only applications, but network traffic, help prevent phishing/smishing) and much more. And for what it's worth, I think Lookout is a great option for this. Here are some considerations I've written previously that should still be relevant. Has this affected you? # I'd very much like to understand the potential impact this CVE has had, or will have, now that it's public and not universally patched. Are you seeing applications showing up in reports you don't expect? How are you handling it? Get in touch, if desired!

  • AAB support for private apps in the managed Google Play iFrame is coming, take a first look here
    by Jason Bayton on March 22, 2025 at 12:00 am

    The Android App Bundle (AAB) is a modern application packaging format introduced by Google to streamline and optimise Android app distribution. Unlike the traditional APK, an AAB contains all the necessary compiled code, resources, and assets for an app only for the purpose of permitting dynamic packaging; it cannot be directly installed through Android's package manager on-device (3rd party options exist though!). Instead, it is uploaded to Google Play, which dynamically processes & bundles the respective code into highly-optimised APKs specific to the device(s) downloading the app. The AAB format has been available to Android developers since 2018, and mandatory for new app uploads from the Google Play console since 2021. The Google Play iFrame, used by enterprises for private app distribution, has however historically mandated APK uploads. Based on a recently-updated help doc, support for AAB in enterprise scenarios appears to be now possible, although it doesn't seem fully rolled out yet. It's live! Not a day or so after this article went up, Google announced general availability, including answering some questions and touching on scenarios raised below. I'll dot additional thoughts in callouts like this one where relevant with updated data. All the same, I spent some time figuring out what's possible so you don't have to! How AAB and APKs differ # First thing's first, is this a pitch to organisations to immediately push all private applications over to AAB? No. There are valid use cases for both, which presumably (in addition to understanding the effort it may take organisations to convert over) is why Google will continue supporting APKs in the iFrame. That said, here's a brief overview of each. APKs # An APK is a single package file containing all the resources, assets, and compiled code for all supported device configurations. While this offers the greatest compatibility across a device estate, it means APK files are often larger than necessary as they include resources irrelevant to the downloading device. APKs offer simplicity and convenience for developers who want a quick, straightforward way to package and share their applications. They ensure broad compatibility across all Android devices without additional processing or conversion. Additionally, APKs support offline installation, making them ideal for environments with limited or no connectivity. Their self-contained nature enables immediate deployment and rapid testing, which accelerates development and iteration cycles. Furthermore, APKs provide flexibility by allowing distribution through various channels beyond Google Play, including alternative app stores or direct downloads. Finally, because APKs don't rely on Google Play explicitly, they're suitable for devices lacking Google Play access, or regions where it isn't available. That covers everything from deployment to devices in restricted countries such as China, to closed-network environments without direct access to Google Play. AOSP is a consideration also, but there's a lot more to managing AOSP that I won't dive into here. Android App Bundles (AAB) # Like an APK, an AAB is a publishing format containing all the necessary components in a single file, the difference is in the processes that occur after uploading to Google Play, as I opened with above. As well as significantly reducing app sizes through dynamically generated, optimised APKs tailored to each user's device, AABs also support dynamic delivery of features and resources, enabling efficient feature rollouts and resource management. Release management is also simplified, as developers maintain only a single upload file, eliminating the need to manually handle multiple APK variants for different architectures or feature sets. Additionally, AAB leverages App Signing by Google Play, centralising key management, potentially increasing security, and simplifying key recovery - particularly sometimes beneficial in organisations who have struggled with key storage and management in the past. Finally, AABs allow for larger uploads to Google Play, exceeding the 100MB APK limit that appears to be a blocker for the organisations I've worked with quite often. Leveraging AABs with Android Enterprise # In enterprise scenarios, Android App Bundles enable organisations to deliver tailored application experiences by dynamically serving device-specific features, languages, and resources as needed. This customisation simplifies version management, reduces deployment overhead, and leads to streamlined app lifecycle management, significantly improving end-user experiences. For organisations operating under tight data budgets, the optimised app sizes alone can justify migrating to the AAB format due to significantly reduced download sizes and improved efficiency. Enough talk, AABs in action # For the context of this article, I opted to take an existing APK and convert it to AAB. There are two reasons for this: It seemed like the more complex approach, so makes for more interesting reading. Google hadn't yet turned on AAB uploads for new private apps from the iFrame for my enterprises. General availability update I have added the experience for new AAB uploads towards the end. Here's where we start; I have a private application uploaded as an APK: Clicking into the application, I can select Advanced editing options to head to the Google Play Console: I can then head into the application, click Test and release > Production and create a new release. All so far, so normal. Other tracks are available if Production isn't desired. On any other day, if I were to manage an app update from within the Play Console - which is a perfectly valid approach for organisations with advanced knowledge of developing and distributing applications - I would upload an APK via the upload link. We're not here for APKs though. To go further, I need to enrol into Play app signing. Enrol into Play app signing # Play app signing is a requirement for AABs, as Google needs to be able to sign generated APKs on behalf of the organisation when distributing them to devices. I'm clicking Use Play app signing to continue: For organisations/developers using a Java KeyStore to facilitate application signing, either via Android Studio or otherwise, this next step offers a guide for extracting the private key from it to allow Google to manage it. I'm using Android Studio and want to upload the key I used to originally sign the APKs, so that's what I'm configuring here: Give Google our keys!? This is down to the organisation and/or the personal views of the developer. I can appreciate this isn't a desirable choice for some, and that's OK. Google offers alternatives for setup, including dual-releases, but you can stop here and return to APK management if desired. If you're on the fence, pros and cons: Pros: Simplified key management: Google securely stores and manages your app signing keys, reducing the complexity and risk of losing keys. They're stored securely: Google uses strong cryptographic security standards to store keys securely, minimising potential breaches or key leaks. Easy key recovery: In case of compromised or lost upload keys, Google provides a straightforward and secure method for recovery without losing your app’s listing and user base. General availability update According to App bundle FAQs, key recovery is not supported for iFrame-uploaded applications at this time, which is a significant omission to the benefits of AAB. Instead, for this feature, a full developer account is required. Optimised distribution: Google Play can leverage advanced features like dynamic feature modules and optimised delivery because they control the final signing process. Cons: Loss of direct control: You relinquish direct control over your signing keys to Google, leaving your app's distribution and security dependent on Google's practices and infrastructure (via Play). Dependence on Google: You'll require careful planning if you choose to distribute your app via alternative channels (non-Play) to ensure friction points are minimised. Security concerns: Organisations with strict security or compliance policies might find Google's key management approach incompatible with their internal security practices. Ultimately, whether Google Play App Signing is suitable depends on your organisation’s requirements for security, flexibility, compliance, and control. That isn't a finite list, and I'm also not an expert, so feel free to read more into this through other sources. Still here? Let's continue! The script in the above image is: java -jar pepk.jar --keystore=foo.keystore --alias=foo --output=encrypted_private_key_path --rsa-aes-encryption --encryption-key-path=/path/to/encryption_public_key.pem Note: The KeyStore and alias - if you're unfamiliar - should match what's shown in Android Studio when prompted during the building of a signed application. If you know what you're doing, do your thing. Once the private key .PEM file is output, it can be uploaded to Google via Upload private key: After which I'm then prompted to agree to Play app signing terms. I glanced at it for a good 15 seconds. And we're enrolled: Upload the AAB # There are two ways to now get the AAB up, via console and via iFrame. To ensure it works as I'd expect it to, I opted first to test it in the console where I am confident AAB uploads would be supported. Not least because there's a draft release still pending. I headed back to Test and release > Production, and clicked the Releases tab, allowing me to Edit release: As now pictured, Releases signed by Google Play is showing, so I'm good to select and upload an AAB in the upload area below: If you scroll up, you'll note the version in the managed Play iFrame was on version 1.0, and the console here is now showing version 2 (1.1). I carried on through the process, paying attention to any damning errors, warnings, and messages (the Play Console is missing an Oxford comma, there). I chose to ignore two warnings about obfuscation and a government declaration, because I haven't needed to worry about them in the iFrame. I'll update here if that becomes a problem later: Send the change(s) for review.. ..and voilà! 8 nail-biting minutes later, the iFrame also updated to the latest build. And finally, it pushed to my test device nice and quickly, no fuss at all. Note the size difference between versions below. All I did was bump the version in build.gradle and build an AAB rather than an APK for the newer version! Note: I'm aware this is not the same device, their version sizes matched on 1.0, though. Updating from the iFrame # While in the iFrame, I'd be remiss if I didn't test it here also. It's literally a case of editing the app as normal, and just selecting the AAB instead: Done. Upload a new AAB from the iFrame # With AAB support fully rolled-out, testing AAB uploads via the iFrame directly turned out to be a lot simpler. First, I add a new app: Then, I upload my AAB and accept the terms. I definitely read these again. Create! And as quickly as that, my AAB is uploaded: What needs work? # General availability update The first two of the following issues are resolved, as noted by the demonstration of uploading a new AAB added above. Feel free to skip to key management. While in the iFrame, I'd be remiss if I didn't test it here also. Here's one of a few snags with the process currently, which I'll state after the image: Did you see it? It still references APK file, but it does in fact allow the upload of an AAB. Luckily the file extension is conveniently left in place (thanks, Google!) so you can see it is, indeed, an AAB. Based on Google's help doc, what we can expect to see, at some point, is a more generic label replacing APK file: One of the other snags that currently exists is the inability to upload an AAB as a new application from the iFrame, even having followed Google's guidance in enabling Play app signing. The upload allows the selection of an AAB, but the submit button remains greyed out. I went into browser tools and manually enabled the button, only to be met with another error: Key management # It's worth pointing out when doing AAB uploads from the iFrame, Google will generate the key: Note: Private apps that are created for the first time by uploading an AAB to the iframe will use a Google-generated app signing key. Use one of the options below to use your own signing key: Use the Play Console to create the private app with an AAB Use the iframe to create the private app with an APK then switch to AAB. Tying back to the callout above, if you have desires to use your own key with all uploaded apps, follow their advice and use the console with a full developer account to upload a new application. Finally, and hopefully another symptom of this not yet being fully rolled out, is the lack of permissions for key management: General availability update Unfortunately this won't change. Google have, as above, limited the options admins have for key management with iFrame-uploaded AABs. It's too bad, as it looks like the below concern has been further validated once again. It's an ongoing frustration generally, actually; permissions are overly restrictive across the portal due to the unique way Android Enterprise app management is set up. I'd like to be able to have my delegated accounts (i.e. [email protected], not the Google service account) act like an admin when it is granted admin permissions: create apps here, rotate keys in this instance, and so on. I haven't been able to get that working as yet. In summary # Google's move toward supporting Android App Bundles for private app distribution in the managed Google Play iFrame is well overdue, but great to see. While clearly still in the rollout phase, early exploration shows what's already possible and highlights some areas needing further refinement. For organisations ready to embrace smaller app sizes, streamlined deployments, and more flexible/redundant key management, the transition from APK to AAB is worth considering, at least when it becomes fully available; full support within the iFrame will undoubtedly make this process smoother and more broadly accessible in the near future. As always, plan your strategy carefully - particularly around key management and app distribution - to align with your organisation's security, compliance, and operational requirements.

    Feed has no items.

Brooks Peppin's Blog Managing Windows in the Modern Workplace

Many Miles Away Helping you succeed with end user computing technologies

    Feed has no items.

    Feed has no items.

    Feed has no items.
  • Workspace ONE UEM Sensors and custom Registry values
    by techhub981158167 on June 10, 2024 at 12:58 pm

    I had a customer enquiry recently where they were looking to pull some custom fields from a device to identify a device location, well at least where it was deployed, as well as come custom tags and other information they associate with a device at the time of deployment. If you have used Workspace ONE … Continue reading Workspace ONE UEM Sensors and custom Registry values →

  • VMware App Volumes Apps on Demand
    by techhub981158167 on January 8, 2024 at 3:26 pm

    There are plenty of articles explaining what VMware App Volumes Apps on Demand are and the benefits, for example https://www.vmware.com/uk/topics/glossary/content/apps-on-demand.html. This video demonstrates how quick and east it is to associate an App Volumes Server with an RDS Host in VMware Horizon and subsequently deliver a package using Apps on Demand.

  • End of Year
    by techhub981158167 on December 20, 2023 at 10:14 am

    When I started this blog and YouTube channel a few years back I never really had a target other than to share any tips, tricks, information and how to for various EUC products. It’s always nice to see the end of year stats and know that people are looking at your content. Diving into the … Continue reading End of Year →

  • The next phase of Workspace ONE UEM Sensors
    by techhub981158167 on December 8, 2023 at 11:14 am

    Earlier this year I wrote a blog article about using ChatGPT to write PowerShell scripts that could be used in Workspace ONE UEM to create Sensors. This works fine, but bear in mind that ChatGPT created PowerShell scripts for me based on best endeavours, there is no guarantee they would work or would not contain … Continue reading The next phase of Workspace ONE UEM Sensors →

  • Workspace ONE UEM and Windows Multi User
    by techhub981158167 on August 23, 2023 at 3:48 pm

    Multi User or Shared Device, if you want to look at it that way, is something that has been supported with VMware Workspace ONE UEM but more so for Mobile Operating Systems rather than Windows. VMware has received feedback from several customers on wanting to be able to support a Windows Multi User use case. … Continue reading Workspace ONE UEM and Windows Multi User →

Thomas Cheng Welcome to my digital home!

VirtuallyUnboxed Lifting the lid on everything virtual

  • End of support for vSphere 6.5.x and 6.7.x
    by virtuallyunboxed on October 20, 2022 at 4:31 pm

    In case you missed it, last week marked the end of general support for vSphere 6.5 and 6.7. This is the same regardless of whether you were using it for data centre services or EUC services like Horizon.

  • Desktop Repurposing v4
    by virtuallyunboxed on October 20, 2022 at 4:23 pm

    This year, myself and Matt Evans joined forced again, along with newcomer, Jonathan D'arcy to review some of the best desktop repurposing tools on the market. As with previous years we reviewed imaging and performance. However, this year we also took a look at the accompanying management solutions.

  • VMware SASE and Cloud Web Security
    by virtuallyunboxed on January 22, 2022 at 3:11 pm

    Let's start with the basics! SASE is a Gartner term and is an abreviation of Secure Access Service Edge. Still not much help right? Well lets start explaining this by looking at how people typically work, espeically remotely, and how their traffic is secured. Most of you that ever work remotely will most likely use a device level VPN. This uses software on your device to create a tunnel into your company data centre and allows you to remotely access internal resources. This is how most companies have done it for many years, and it really dates back to the days when all a companies resources were in their own data centre. Tunnelling all the traffic back into the data centre was the perfect way to reach everything a remote user would need.

  • Workspace ONE UEM and Workspace ONE Access Integration for Hub Services
    by virtuallyunboxed on March 2, 2021 at 4:06 pm

    I know there are a lot of SaaS customers out there who have only been using basic MDM functionality within Workspace ONE. The platform has moved on a lot in the last few years and if you haven't already seen it i strongly suggest you check out hub services. This takes the Workspace ONE agent that is used for device management and adds additional functionality to the application such as a unified app catalogue, people search and a notifications platform to name but a few!

  • Workspace ONE Access FIDO2 integration
    by virtuallyunboxed on February 19, 2021 at 2:33 pm

    As of this month (Feb 2021) All Workspace ONE Access SaaS tenants, now supports FIDO2 as an authentication method. So, I thought i'd put together a short video showing how easy it is to configure it and some different device types using the solution.

Mobile Jon's Blog My WordPress Blog

  • Intune Security Baselines: The Truth Behind the Chaos
    by MobileJon on July 4, 2025 at 10:08 pm

    Recent chaos surrounding Intune Security Baselines stemmed from issues when upgrading from 23H2 to 24H2 after deviating from recommended settings. Best practices recommend avoiding built-in baselines, opting instead for imported or third-party options for flexibility and reduced conflict, while emphasizing proper policy management for enhanced security.

  • Nerdio Manager for Enterprise vs. Hydra Part Two
    by MobileJon on June 30, 2025 at 4:00 am

    The comparison between Nerdio and Hydra highlights their strengths and weaknesses. While Nerdio leads with advanced features and capabilities, Hydra offers significant value, especially for smaller operations. Nerdio’s extensive functionalities appeal to enterprises, while Hydra may suit those with VDI experience. Ultimately, the choice depends on user needs and preferences.

  • Nerdio Manager for Enterprise vs. Hydra Part One
    by MobileJon on June 23, 2025 at 10:44 am

    Login VSI's acquisition of Hydra has sparked debate in the DaaS industry, where nearly 50% rely on Nerdio for Azure Virtual Desktop management. This article explores both tools, their features, and their significance amidst rising costs and rapid Azure migration. The comparison ultimately raises questions about market positioning and future relevance.

  • Troubleshooting and Fixing Personalization Policies in Microsoft Intune
    by MobileJon on May 28, 2025 at 1:29 pm

    The obvious thing about this article is that it seems oddly specific. It absolutely is! Awhile back, I wrote a

  • Windows Autopatch: Revisited Part 1
    by MobileJon on May 16, 2025 at 1:11 am

    Last year, I released a super popular article that was my top article on 2024. It’s time to update things

    Feed has no items.

VMware Workspace ONE The un-official subreddit for VMware Workspace ONE. I recently started learning/managing Workspace One for the company I work for, I came to reddit to find others and saw that there wasn’t a community, so I started one. Our discord is here https://discord.gg/Zhr3TqMMf6

  • Anyone has experience updating user role on workspace one uem via poweshell api call
    by /u/Life-Water-2190 on July 24, 2025 at 11:32 am

    Hi, I have a poweshell script that is able to connect via api, return a list of users with at least one device and what is the user role associated to them, however I can’t find a way to update the role they have via this api connection. Any help would be much appreciated submitted by /u/Life-Water-2190 [link] [comments]

  • How do I allow iOS 26 Beta BYOD device enrollment? (HUB + Tunnel)
    by /u/Supi09 on July 24, 2025 at 1:54 am

    submitted by /u/Supi09 [link] [comments]

  • Have you encountered this issue before ?
    by /u/Minute_Loan6357 on July 23, 2025 at 10:59 am

    Hello, We are using the Workspace One console to manage Windows workstations. We are currently experiencing an issue with remote control, which displays the following error message: "This browser doesn't support essential video features" We tested with up-to-date versions of Firefox and Chrome, but without success. We noticed that the error appeared shortly after the console was updated with the new interface. Can you help us? Thank you. submitted by /u/Minute_Loan6357 [link] [comments]

  • Question regarding iOS update assignments - specifically deployment start dates
    by /u/johnnyv1984 on July 22, 2025 at 1:28 pm

    Im currently in the process of updating some of our iPad's in the fleet to the latest version 18.5. Im doing this selectively so i created a new smart group which i want to add iPad's to daily (since i don't want to blast out the update to a large amount all at once) My question is, i created an Assignment for iOS update 18.5 under Device Updates and i have the start time set to 2am. So for example lets say i have the start time as July 23 @ 2am. I know it will kick off at that time BUT tomorrow when i want to add MORE iPad's to the smart group so that they update to 18.5 as well (say at 1pm), will they automatically start to update since its passed 2am at that point? or will the newly added iPad's not start to update until the following day at 2am? I just want to make sure that tomorrow when i add new iPads to the smart group they don't start to automatically download and install during the work day when they are in use. submitted by /u/johnnyv1984 [link] [comments]

  • Intelligent Hub - IOS - Restrict Device Actions
    by /u/DoubleStranger01 on July 21, 2025 at 7:40 pm

    Does anyone know if it's possible or could point to any documentation covering restricting certain device actions that can be taken in the Intelligent Hub app? For reference, I'm referring to opening the Intelligent Hub app > Support > My Devices > Selecting your device and then having access to Clear Passcode, Lock Device, Make Noise etc. submitted by /u/DoubleStranger01 [link] [comments]

  • iPads unable to connect to Pencil
    by /u/No_Support1129 on July 18, 2025 at 5:20 pm

    I have confirmed compatibility with the iPad and the apple pencil. That's not the issue. There are no restrictions profiles preventing Bluetooth either. Bluetooth keyboards are able to connect to the same devices. Confirmed the pencil works with other unsupervised devices. I have found nothing in the DEP profile that would indicate to there there would be an issue. This is only happening on a handful of devices. We have plenty of devices that are able to connect. I'm open to suggestions, help!! submitted by /u/No_Support1129 [link] [comments]

  • Deploying Trend VisionOne for Macs in UEM
    by /u/BedDesperate1600 on July 15, 2025 at 2:43 pm

    Hi! I'm trying to deploy Trend's VisionOne software bundle to our environment. Using the Workspace One Admin Assistant to upload the pkg file doesn't seem to be working correctly. The application seems to be made up of one 4MB PKG then several other PKGs nested in folders. When I use the Admin Assistant, it doesn't know about the other PKGs in the installer suite and doesn't create it correctly. For Windows, I could just zip it all, but that doesn't seem to be an option on Mac. Is there a good way to handle applications like this or does anyone know how to deploy Trend properly? submitted by /u/BedDesperate1600 [link] [comments]

  • Deploying internal apk to android device
    by /u/evilteddibare on July 14, 2025 at 7:22 pm

    probably a dumb question but I have some limited experience managing android devices. I've deployed an internal apk to my test device and when I open the app I get the below screenshot - seems like it's untrusted or unsigned? Do I need to work with the Dev team to resolve this? https://preview.redd.it/f8hiafva4wcf1.png?width=1080&format=png&auto=webp&s=35eec19ade93cb8fb77c626345c1f693f68c10dd submitted by /u/evilteddibare [link] [comments]

  • newb question from intune user - android always-on-vpn identifier Q
    by /u/howmanywhales on July 14, 2025 at 12:57 pm

    hello! longtime apple mdm person, first experience with WS1 and android deployment. I am trying to understand how I could recreate a setting in WS1 I've done in Intune, or if it's possible. In Intune, I can set a specific app (via bundleID) to be the Always-On-VPN client for the Android device. All I have to do is create a new device restrictions config profile for Android: Device -> Config -> New Policy -> Device Restrictions template -> Connectivity section and enter the bundle ID of the app i want to specify. Picture of Intune here: https://imgur.com/a/GANXlAO In WS1, it seems like I have to choose either Tunnel, Cisco, or Pulse as my choice - I cannot specify a custom app on the device. To me, it feels like I'm just missing the section I can specify this - but I could definitely be wrong - as I'm very new to the WS1 console! to clarify - in intune i'm not configuring a whole VPN set up - i'm simply designating a app bundle as the host and then the app bootstraps itself once it's launched. submitted by /u/howmanywhales [link] [comments]

  • Problem with Windows 10/11 Device Wipe/Reinstall
    by /u/Atom8553 on July 10, 2025 at 11:17 am

    Hello, I am encountering a significant issue when using Device Wipe for Windows devices. We have a hybrid environment (Entra and on-premise). If I use Device Wipe, the device performs a wipe, but after I log in as a new user, reboot the device, and log in again, Windows gets stuck in "Preparing Account" (if that is what it says in English, our devices are in Finnish). Under this, it says "Join company network (completed)" and other steps fail. I have tried reinstalling Windows, same thing. Today, I noticed that reinstall does work on a device that has an AMD CPU, but 2 PCs (a desktop and a laptop) with an Intel CPU are having this issue. I had to reinstall Windows on that PC with an AMD CPU, but everything seems to work after that. Anyone else having this kind of issue? I had to download the RST driver on a USB stick because these PCs with an Intel CPU didn't load the SSD first. Could an Intel CPU cause this somehow? I have not contacted Omnissa yet. submitted by /u/Atom8553 [link] [comments]

  • Access remote settings
    by /u/nachoitguy on July 2, 2025 at 2:31 pm

    Hey guys were are the setting for changing if a user needs to approve remote access? submitted by /u/nachoitguy [link] [comments]

  • Need some help granting sudo so a user can pull logs
    by /u/echeck80 on July 1, 2025 at 12:48 pm

    Hello everyone! I'm really struggling on something that I feel like should be super easy. We use WS1 to manage our Macs, and I need a user to pull some logs, but the terminal command to pull them requires sudo. Can I grant sudo to the device itself? I don't have a ton of experience in WS1, but I am an admin with full rights. Thanks! submitted by /u/echeck80 [link] [comments]

  • Group Policy via WS1
    by /u/Proof-Focus-4912 on June 25, 2025 at 2:56 pm

    I have a client who has AAD for IAM, but no InTune. They want to enforce a local lockout after 5 failed tries. They tried creating a baseline, but apparently that didn't work. Can a Profile accomplish this? What other options do they have? submitted by /u/Proof-Focus-4912 [link] [comments]

  • Hub not installing iOS 50% of the time.
    by /u/No_Support1129 on June 25, 2025 at 2:07 pm

    DEP, Supervised and batched to stage for the end user. ABM purchased licenses. Issue is that Hub is not installing. Omnissa support has no idea why 50% of the time, I have to push it from the console to the device to get it to install during enrollment. Surely I'm not the first to experience this. What gives?? submitted by /u/No_Support1129 [link] [comments]

  • View all installed applications in windows 11
    by /u/Terrible_Sand62 on June 19, 2025 at 3:47 pm

    How can I view all installed applications in the windows 11 device? Under Device > Applications it only list UEM manage applications. We are using the WS1 SaaS version submitted by /u/Terrible_Sand62 [link] [comments]

  • Is there a way to update a purchased app on a small group of devices as a beta test before pushing the update to your entire fleet?
    by /u/johnnyv1984 on June 18, 2025 at 6:28 pm

    The company i work for has a fleet of over 1300 iPad's in Workspace One. Of those 1300 we have them split into 3 different Organizational groups depending on what the iPad's job is and those groups have their own set of purchased apps assigned to them. We want to start beta testing purchased app updates to specific iPad's only before pushing the update out to the entire fleet. For example, one of our organizational groups has about 300 iPad's in it and they all run a timeclock application. We currently have the purchased app set to NOT auto update but it says its latest version is 2.4.0 . The version on most of our iPad's still reports as 1.9.1 or whatever latest version was currently available at the time of onboarding and getting put into its respective organizational group. Is there anyway at all possible that i can have a group of say 30 ipad's that i can beta test the latest version of the purchased app on before pushing it out to the entire fleet? I know if i go into Devices on the left hand side, look up an iPad and select it, then go into Apps i can put a checkmark next to the app and then click Install and it will install the latest version (even though its already reporting as installed), but that is extremely time consuming. We tried creating a Beta child group to one of our organizational groups and made sure it was apart of the correct smart groups as well (so that it would have all its correct profile settings and apps). But when i put one of the iPad's in that group, then went into Resources > Apps > Native Apps > Purchased and then selected the timeclock app, looked to see what devices it was installed on and filtered by organizational group. I found the iPad in the beta test group and told it to install the app from there and it didn't work. Any help would be greatly appreciated. Thanks! submitted by /u/johnnyv1984 [link] [comments]

  • Compliance data in Azure/Intunes
    by /u/SpurgtFuglen on June 16, 2025 at 7:11 am

    I am trying to enable 3rd party compliance in intune. Right now it is stuck at Pending activation. https://preview.redd.it/thiwl44eo87f1.png?width=1446&format=png&auto=webp&s=0e996f258f84aa5de2e529c928527e3db423a3b1 I am not sure if this has to do with this? I cant find the settings for enabling compliance data in ws1. https://preview.redd.it/i3bcmj8jo87f1.png?width=781&format=png&auto=webp&s=c0e5beec751d3b239f8d34174f8d9cd17a7a70a7 submitted by /u/SpurgtFuglen [link] [comments]

  • Demo of Apple's new migration tool in ABM
    by /u/zombiepreparedness on June 11, 2025 at 9:34 pm

    I thought I would share this. A demo of the migration from Microsoft Intune to Workspace ONE using Apple's new migration tool built into ABM. This is on a 4th gen iPad Pro. The process is a little rough around the edges, but it is pretty darn seamless. Quite impressive. iPadOS 26 Beta Migration submitted by /u/zombiepreparedness [link] [comments]

  • Android Hub App Crashes
    by /u/DarksabreX on June 11, 2025 at 9:27 pm

    Anyone seeing the following error on Android devices after the Hub crashes? The message reads: Hub closed because the app has a bug. Try updating the app after its developer provides a fix for the error. Thank you. submitted by /u/DarksabreX [link] [comments]

  • iOS Tunnel App Deprecation
    by /u/mattrjk on June 10, 2025 at 7:43 pm

    Anyone just get an email from Omnissa regarding the iOS Tunnel app being deprecated and needing to migrate to the new one by June 15? I'm reasonably confident that this is the first we've heard of this. Is anyone aware of the minimum UEM version requirement? We don't have the option to add an additional bundle to a VPN profile as indicated in https://kb.omnissa.com/s/article/6000683. submitted by /u/mattrjk [link] [comments]

The Support Insider VMware Support News, Alerts, and Announcements

  • Simpler Licensing with VMware vSphere Foundation and VMware Cloud Foundation 5.1.1
    by Kelcey Lemon on March 21, 2024 at 5:28 pm

    Tweet VMware has been on a journey to simplify its portfolio and transition from a perpetual to a subscription model to better serve customers with continuous innovation, faster time to value, and predictable investments. To that end, VMware recently introduced a simplified product portfolio that consists of two primary offerings: VMware Cloud Foundation, our flagship … Continued The post Simpler Licensing with VMware vSphere Foundation and VMware Cloud Foundation 5.1.1 appeared first on VMware Support Insider.

  • VMware Skyline Advisor Pro Proactive Findings – January 2024 Edition
    by James Walker on January 24, 2024 at 11:16 am

    Tweet VMware Skyline Advisor Pro releases new proactive Findings every month. Findings are prioritized by trending issues in VMware Technical Support, issues raised through post escalation review, security vulnerabilities, issues raised from VMware engineering, and nominated by customers. For the month of January, we released 60 new Findings. Of these, there are 37 Findings based … Continued The post VMware Skyline Advisor Pro Proactive Findings – January 2024 Edition appeared first on VMware Support Insider.

  • Skyline Advisor Pro: Introducing Inventory Export Reports
    by Kelcey Lemon on January 16, 2024 at 12:00 pm

    Tweet You’ve asked for the ability to export inventory information, including licensing, and we’ve listened. The Skyline Team is proud to introduce this highly requested feature, Inventory Export Reports. Inventory Export Reports allow you to generate reports on your inventory, licensing, and configuration data. These reports can help you to identify potential problems, track changes … Continued The post Skyline Advisor Pro: Introducing Inventory Export Reports appeared first on VMware Support Insider.

  • VMware Skyline Advisor Pro Proactive Findings – December 2023 Edition
    by James Walker on December 15, 2023 at 6:56 pm

    Tweet VMware Skyline Advisor Pro releases new proactive Findings every month. Findings are prioritized by trending issues in VMware Technical Support, issues raised through post escalation review, security vulnerabilities, issues raised from VMware engineering, and nominated by customers. For the month of December, we released 56 new Findings. Of these, there are 35 Findings based … Continued The post VMware Skyline Advisor Pro Proactive Findings – December 2023 Edition appeared first on VMware Support Insider.

  • VMware Skyline Advisor Pro: Proactive and Diagnostic Findings Demystified
    by Kelcey Lemon on December 13, 2023 at 3:07 pm

    Tweet While supporting VMware Explore 2023 in Barcelona, a customer asked me, “What’s the difference between Proactive Findings and Diagnostic Findings in Skyline Advisor Pro and how are each one produced?” So, I’d like to take this moment to elaborate more on my original blog that introduced Diagnostic Findings. Proactive Findings Proactive Findings are potential … Continued The post VMware Skyline Advisor Pro: Proactive and Diagnostic Findings Demystified appeared first on VMware Support Insider.

  • VMware Skyline Advisor Pro Proactive Findings – October 2023 Edition
    by James Walker on October 27, 2023 at 4:33 pm

    Tweet VMware Skyline Advisor Pro releases new proactive Findings every month. Findings are prioritized by trending issues in VMware Technical Support, issues raised through post escalation review, security vulnerabilities, issues raised from VMware engineering, and nominated by customers. For the month of October, we released 39 new Findings. Of these, there are 30 Findings based … Continued The post VMware Skyline Advisor Pro Proactive Findings – October 2023 Edition appeared first on VMware Support Insider.

  • From upgrading vSphere to troubleshooting issues with Tanzu Kubernetes Grid: Top 10 VMware Tanzu Knowledge Base Articles in September 2023.
    by Marcela Gleixner on October 11, 2023 at 12:18 pm

    From upgrading vSphere to troubleshooting issues with Tanzu Kubernetes Grid: Top 10 VMware Tanzu Knowledge Base Articles in September 2023. The post From upgrading vSphere to troubleshooting issues with Tanzu Kubernetes Grid: Top 10 VMware Tanzu Knowledge Base Articles in September 2023. appeared first on VMware Support Insider.

  • 10 most popular KB articles in September 2023, for VMware Tanzu Application Service, BOSH and more.
    by Marcela Gleixner on October 9, 2023 at 9:54 pm

    10 most popular KB articles in September 2023, for VMware Tanzu Application Service, BOSH and more. The post 10 most popular KB articles in September 2023, for VMware Tanzu Application Service, BOSH and more. appeared first on VMware Support Insider.

  • Top 10 Most Popular Knowledge Articles for Horizon, WorkspaceONE, End User Computing (EUC), Personal Desktop for September, 2023   
    by Jamie Gravatte on October 6, 2023 at 4:31 pm

    Tweet Get answers and solutions instantly by using VMware’s Knowledge Base (KB) articles to solve known issues. Whether you’re looking to improve your productivity, troubleshoot common issues, or simply learn something new, these most used and most viewed knowledge articles are a great place to start.   Here are the top 5 most viewed KB articles … Continued The post Top 10 Most Popular Knowledge Articles for Horizon, WorkspaceONE, End User Computing (EUC), Personal Desktop for September, 2023    appeared first on VMware Support Insider.

  • Top 10 Most Popular Knowledge Articles for HCX, SaaS, EPG Emerging Products Group for September, 2023   
    by Jamie Gravatte on October 5, 2023 at 2:26 pm

    Tweet Get answers and solutions instantly by using VMware’s Knowledge Base (KB) articles to solve known issues. Whether you’re looking to improve your productivity, troubleshoot common issues, or simply learn something new, these most used and most viewed knowledge articles are a great place to start.   Here are the top 5 most viewed KB articles … Continued The post Top 10 Most Popular Knowledge Articles for HCX, SaaS, EPG Emerging Products Group for September, 2023    appeared first on VMware Support Insider.