- Dec 06, 2016 Tutorial on how to setup an app for the ipad in autonomous single app mode using Filewave MDM. Filewave 11.2.2 is the version of Filewave in this tutorial.
- A standard Single App Mode session is started and ended either by physically syncing the device with a specific Mac using Configurator or remotely through a mobile device management (MDM) system. How to set up Single App Mode. Autonomous Single App Mode. Autonomous Single App Mode allows an app to start and end a Single App Mode session from.
- To receive the latest developer news, visit and subscribe to our News and Updates.
The main difference is autonomous do not require a controller to control the AP and it use WLSE for management software; the LWAPP require a WLC wireless controller to control all of the AP but provide ease of management for the communication / setting between APs.
-->Software update policies let you force supervised iOS/iPadOS devices to automatically install OS updates. Supervised devices are those that enrolled using either Apple Business Manager or Apple School Manager. When configuring a policy to deploy updates, you can:
- Choose to deploy the latest update that's available, or choose to deploy a an older update by the update version number if you don't want to deploy the latest update. If you choose to deploy an older update, you must also set a Device Configuration policy to restrict visibility of software updates.
- Specify a schedule that determines when the update installs. Schedules can be as simple as installing updates the next time that the device checks in, or creating date and time ranges during which updates can install or are blocked from installing.
This feature applies to:
- iOS 10.3 and later (supervised)
- iPadOS 13.0 and later (supervised)
By default, devices check in with Intune about every 8 hours. If an update is available through an update policy, the device downloads the update. The device then installs the update upon next check in within your schedule configuration. Although the update process does not typically involve any user interaction, if the device has a passcode the user must enter it in order to start a software update. Profiles don't prevent users from updating the OS manually. Users can be prevented from updating the OS manually with a Device Configuration policy to restrict visibility of software updates.
Note
If using Autonomous Single App Mode (ASAM), the impact of OS updates should be considered as the resulting behaviour may be undesirable.Consider testing to assess the impact of OS updates on the app you are running in ASAM.
Configure the policy
- Sign in to the Microsoft Endpoint Manager admin center.
- Select Devices > Update policies for iOS/iPadOS > Create profile.
- On the Basics tab, specify a name for this policy, specify a description (optional), and then select Next.
- On the Update policy settings tab, configure the following:
- 3rd party apps to print envelopes on mac. Select version to install. You can choose from:
- Latest update: This deploys the most recently released update for iOS/iPadOS.
- Any previous version that is available in the dropdown box. If you select a previous version, you must also deploy a device configuration policy to delay visibility of software updates.
- Schedule type: Configure the schedule for this policy:
- Update at next check-in: The update installs on the device the next time it checks in with Intune. This is the simplest option and has no additional configurations.
- Update during scheduled time: You configure one or more windows of time during which the update will install upon check-in.
- Update outside of scheduled time: You configure one or more windows of time during which the updates won't install upon check-in.
- Weekly schedule: If you choose a schedule type other than update at next check-in, configure the following options:
- Time zone: Choose a time zone.
- Time window: Define one or more blocks of time that restrict when the updates install. The effect of the following options depends on the Schedule type you selected. By using a start day and end day, overnight blocks are supported. Options include:
- Start day: Choose the day on which the schedule window starts.
- Start time: Choose the time day when the schedule window begins. For example, if you select 5 AM and have a Schedule type of Update during scheduled time, 5 AM will be the time that updates can begin to install. If you chose a Schedule type of Update outside of a scheduled time, 5 AM will be the start of a period of time that updates can't install.
- End day: Choose the day on which the schedule window ends.
- End time: Choose the time of day when the schedule window stops. For example, if you select 1 AM and have a Schedule type of Update during scheduled time, 1 AM will be the time that updates can no longer install. If you chose a Schedule type of Update outside of a scheduled time, 1 AM will be the start of a period of time that updates can install.
If you do not configure times to start or end, the configuration results in no restriction and updates can install at any time.NoteYou can configure settings in Device Restrictions to hide an update from device users for a period of time on your supervised iOS/iPadOS devices. A restriction period can give you time to test an update before its visible to users to install. After the device restriction period expires, the update becomes visible to users. Users can then choose to install it, or your Software update policies might automatically install it soon after.When you use a device restriction to hide an update, review your software update policies to ensure they wont schedule the install of the update before that restriction period ends. Software update policies install updates based on their own schedule, regardless of the update being hidden or visible to the device user.
After configuring Update policy settings, select Next. - On the Scope tags tab, select + Select scope tags to open the Select tags pane if you want to apply them to the update policy.
- On the Select tags pane, choose one or more tags, and then click Select to add them to the policy and return to the Scope tags pane.
When ready, select Next to continue to Assignments. - On the Assignments tab, choose + Select groups to include and then assign the update policy to one or more groups. Use + Select groups to exclude to fine-tune the assignment. When ready, select Next to continue.The devices used by the users targeted by the policy are evaluated for update compliance. This policy also supports userless devices.
- On the Review + create tab, review the settings, and then select Create when ready to save your iOS/iPadOS update policy. Your new policy is displayed in the list of update policies for iOS/iPadOS.
For guidance from the Intune support team, see Delay visibility of software updates in Intune for supervised devices.
Note
Apple MDM doesn't allow you to force a device to install updates by a certain time or date. You can't use Intune software update policies to downgrade the OS version on a device.
Edit a policy
You can edit an existing policy, including changing the restricted times:
- Select Devices > Update policies for iOS. Select the policy you want to edit.
- While viewing the policies Properties, select Edit for the policy page you want to modify.
- After introducing a change, select Review + save > Save to save your edits, and return to the policies Properties.
Note
If the Start time and End time are both set to 12 AM, Intune does not check for restrictions on when to install updates. This means than any configurations you have for Select times to prevent update installations are ignored, and updates can install at any time.
Autonomous Single App Mode Mac Free
Monitor device installation failures
Software updates > Installation failures for iOS devices shows a list of supervised iOS/iPadOS devices targeted by an update policy, attempted an update, and couldn't be updated. For each device, you can view the status on why the device hasn't been automatically updated. Healthy, up-to-date devices aren't shown in the list. 'Up-to-date' devices include the latest update that the device itself supports.
Autonomous Single App Mode Apple Configurator
Next steps
Monitor its status.