FAMOC 5.3.0: - FAMOC Base Agent 5.3.0 for Android: - Enhanced send message operation with new type of message that can be shown on device as a popup - Possibility to perform critical management functions when device is in direct boot state, including wipe and reset of the lock code (only for nonSamsung devices) - Static content download Possibility to define application external source of the apk file. When defined (on application details page), apk file will be downloaded and installed by Base Agent - Factory reset protection management New option in security options (wipe section) of the policy with the possibility to: - unlock the device with an active account on device - unlock the device with an account from the defined list - remove the factory reset protection (FRP) after device wipe In addition, when performing device wipe, we can clear the factory reset protection (FRP). List of the unlock accounts must contain the valid Google user ID's. They can be obtained from the Google API, using the link below: https://developers.google.com/people/api/rest/v1/people/get?apix_params=%7B%22resourceName%22%3A%22people%2Fme%22%2C%22personFields%22%3A%22metadata%22%7D By executing the API call and logging with valid Google account, response returns the 'id' field of the user. - Block private DNS settings - new option in security options (network section) of the policy Since Android 9, user is able to set private DNS or turn off the DNS over TLS on the device. With this option we can disable this setting on device. - new Famoc Agents (Addon 1.7.0, Remote Access 4.5.2) for Hammer devices - new Famoc Agents (Addon 1.7.0, Remote Access 4.5.2) for Lenovo TAB M10 - Deprecated KNOX configurations (default ones should be used instead on Samsung devices with work profile): - Strongswan VPN for KNOX - KNOX Exchange configuration - VPN for KNOX configuration - KNOX APN configuration - iOS/iPadOS 13.3 platform support - iOS application configuration improvements: - [UI] Possibility to upload file with configuration parameters and maintain the custom values (nested parameters supported) The example is Google Chrome configuration (https://www.chromium.org/administrators/ios-mdm-policy-format) - iOS Exchange configuration improvements (new options): - Enable use of Mail Drop - Disable the Mail service - Prevent the user from changing the state of the Mail service - Disable the Contacts service - Prevent the user from changing the state of the Contacts service - Disable the Calendar service - Prevent the user from changing the state of the Calendars service - Disable the Notes service - Prevent the user from changing the state of the Notes service - Disable the Reminders service - Prevent the user from changing the state of the Reminders service - Enable OAuth with suboptions: - The URL used for signing in via OAuth - The URL used for token requests via OAuth - S/MIME support with suboptions: - Allow user to enable or disable S/MIME signing - Allow user to modify S/MIME encryption certificate - Encrypt by default - Allow user to enable or disable S/MIME encryption - Enable encryption per-message switch NOTE: Disabling all services: Mail, Contacts, Calendars, Notes and Reminders will cause the operation to fail and is not recommended by Apple. - iOS WLAN configuration - WPA3 encryption type support - Translations tab reorganization - Administrator is able to maintain languages and translations of both interfaces (UI and Advanced) in one place (accessible via Advanced tab or UI tab). - List of languages shows the number of not translated tokens, users/organizations assigned to the language and date of the last change. - List of the languages provides possibility to: - import / export translations of the specific language - enable / disable the language When disabling the language that is used by users or organizations - administrator will be prompted to change the language of those users / organizations to the default one. - Export of the translations can be done with filter: - all translations - only new/changed translations after last import (including not translated tokens) - Possibility to define mySQL access configuration (server address, user name and password) using famoc-config tool Option is available in System configuration > MySQL server access. - Possibility to define number of archived device monitor sessions Option is available in policy settings, next to the number of stored device monitor sessions. - Possibility to assign user to specific user group when selected flag is set in AD/LDAP synchronization. "Assign user group based on LDAP attribute" option added on AD/LDAP import edit page. Administrator can select the LDAP class name and attribute name. When the value of this field will be set in synchronization, user will be automatically assigned to the selected user group. This setting can be used eg for the quarantine. User group can be assigned to the specific policy with limited settings. When the LDAP flag will be set, user's devices will be moved to the specific policy. - Audited password custom field view Possibility to view value of the password custom field. Option is available under the separate role privilege in device details view. - [UI] Application list search is expanded to the application name, description, version, application group names - [UI] Application details improvements: - new subtab: Availability - with platforms and device models assignments - Default file format option for the Export changed from "separated by comma" to "separated by semicolon" For more details please refer to the FAMOC documentation.