From 7ef0a0b3a40b76fa888ea19fbb206677dcb21c41 Mon Sep 17 00:00:00 2001 From: Benjamin Flamm <57767769+beflamm@users.noreply.github.com> Date: Thu, 14 May 2026 10:25:39 -0400 Subject: [PATCH 1/3] Learn Editor: Update ref-device-restrictions-apple.md --- .../templates/ref-device-restrictions-apple.md | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/intune/device-configuration/templates/ref-device-restrictions-apple.md b/intune/device-configuration/templates/ref-device-restrictions-apple.md index 61340877ef..503efa31da 100644 --- a/intune/device-configuration/templates/ref-device-restrictions-apple.md +++ b/intune/device-configuration/templates/ref-device-restrictions-apple.md @@ -809,7 +809,8 @@ These settings use the [Passcode payload](https://developer.apple.com/documentat > [!NOTE] > The Intune UI for this setting doesn't separate the iOS and iPadOS supported values. The UI might be updated in a future release. -- **Password expiration (days)**: Enter the number of days before the device password must be changed, from 1-730. +- **Password expiration (days)**: Enter the number of days before the device password must be changed, from 1-730. When the password expires, users are prompted to create a new password. When the value is blank or set to **Not configured**, Intune doesn't change or update this setting. + - **Prevent reuse of previous passwords**: Restrict users from creating previous passwords. Enter the number of previously used passwords that can't be used, from 1-24. For example, enter 5 so users can't set a new password to their current password or any of their previous four passwords. When the value is blank, Intune doesn't change or update this setting. - **Block Touch ID and Face ID unlock**: **Yes** prevents using a fingerprint or face to unlock devices. When set to **Not configured** (default), Intune doesn't change or update this setting. By default, the OS might allow users to unlock devices using biometrics. @@ -874,7 +875,7 @@ These settings use the [Passcode payload](https://developer.apple.com/documentat - **Block simple passwords**: **Yes** prevents using simple passwords, such as `0000` or `1234`. When the value is blank or set to **Not configured**, Intune doesn't change or update this setting. By default, the OS might allow simple passwords. - **Maximum minutes of inactivity until screen locks**: Enter the length of time devices must be idle before the screen is automatically locked. For example, enter `5` to lock devices after 5 minutes of being idle. When the value is blank or set to **Not configured**, Intune doesn't change or update this setting. - **Maximum minutes after screen lock before password is required**: Enter the length of time devices must be inactive before a password is required to unlock it. When the value is blank or set to **Not configured**, Intune doesn't change or update this setting. - - **Password expiration (days)**: Enter the number of days until the device password must be changed, from 1-65535. For example, enter `90` to expire the password after 90 days. When the password expires, users are prompted to create a new password. When the value is blank or set to **Not configured**, Intune doesn't change or update this setting. + - **Password expiration (days)**: Enter the number of days until the device password must be changed, from 1-730. For example, enter `90` to expire the password after 90 days. When the password expires, users are prompted to create a new password. When the value is blank or set to **Not configured**, Intune doesn't change or update this setting. - **Prevent reuse of previous passwords**: Restrict users from creating previously used passwords. Enter the number of previously used passwords that can't be used, from 1-24. For example, enter 5 so users can't set a new password to their current password or any of their previous four passwords. When the value is blank, Intune doesn't change or update this setting. - **Maximum allowed sign-in attempts**: Enter the maximum number of times that users can consecutively try to sign in before the device locks users out, from 2-11. When this number is exceeded, the device is locked. We recommend not setting this value to a low number, such as `2` or `3`. It's common for users to enter the wrong password. We recommend setting to a higher value. From fae34a8d9f2322f483a4df9d277c9f035f381afb Mon Sep 17 00:00:00 2001 From: Benjamin Flamm <57767769+beflamm@users.noreply.github.com> Date: Thu, 14 May 2026 10:25:51 -0400 Subject: [PATCH 2/3] Learn Editor: Update ref-device-restrictions-apple.md From 53a9d53f62654dd3c43b789863f4b5f6b9a45b23 Mon Sep 17 00:00:00 2001 From: Mandi Ohlinger <3229224+MandiOhlinger@users.noreply.github.com> Date: Thu, 14 May 2026 10:43:57 -0400 Subject: [PATCH 3/3] Update ref-device-restrictions-apple.md --- .../templates/ref-device-restrictions-apple.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/intune/device-configuration/templates/ref-device-restrictions-apple.md b/intune/device-configuration/templates/ref-device-restrictions-apple.md index 503efa31da..b123960c21 100644 --- a/intune/device-configuration/templates/ref-device-restrictions-apple.md +++ b/intune/device-configuration/templates/ref-device-restrictions-apple.md @@ -1,7 +1,7 @@ --- title: Apple device restriction settings in Microsoft Intune description: Add, configure, or create settings on iOS, iPadOS, and macOS devices to restrict features in Microsoft Intune. Create password requirements, control the locked screen, use built-in apps, add restricted or approved apps, handle bluetooth devices, connect to the cloud for backup and storage, enable kiosk mode, add domains, and control how users interact with the Safari web browser. -ms.date: 04/29/2026 +ms.date: 05/14/2026 ms.topic: reference ms.reviewer: beflamm, jayeren ms.collection: