check-circle-line exclamation-circle-line close-line

VMware Workspace ONE UEM™ Powered by AirWatch 9.7 Release Notes 

Workspace ONE UEM | 5 September 2018

Check for additions and updates to these release notes.

What's in the Release Notes

The release notes cover the following topics:

New Features in this Release

Console

  • Enjoy working with a CAPTCHA free console. 
    Did you know about the challenge-response system known as CAPTCHA? Well, it stands for Completely-Automated-Public-Turing-Test to tell Computers and Humans Apart. The good news is that CAPTCHA is now deprecated, so we removed  all the CAPTCHA prompts, and settings from the Workspace ONE UEM Console, including initial login screen, SSP login screen, console and SSP password recovery screens, and system settings.

  • Console security for administrators got better with the Reset Password solution.
    UEM console security for administrators is enhanced with the removal of the Change Password option in favor of a Reset Password solution. A password reset option means an email is sent to the administrator, so they choose their own password. An administrator's identity is authenticated by answering the password recovery questions that is set up ahead of time.
    You can now find the new Reset Password option in the Admin List View.
     
  • Smart groups just got smarter. You read it right: exclude user groups while you create your smart groups.
    Craft device profiles and compliance policies faster by excluding user groups while you create smart groups. To do so, navigate to Groups & Settings > Groups > Assignment Groups, select Add Smart Group and choose Select Criteria. You can find the new option under Exclusions.
     
  • Filter the Device Last Seen view by the number of days since the console saw a device.
    The Last Seen filter on the Device List View can now list the devices that have been seen more than, less than, or between any number of days. These options make it easier to configure lists of devices that are out of touch with the rest of your fleet, allowing you to take action.
    Check out the new Last Seen filter by navigating to Devices > List View, select the Filters button, and then select the Status drop down menu.
     
  • Re-enrolling your previously un-enrolled device got simpler with the whitelist retention policy.
    The whitelist that allows registered devices to enroll was purged after 90 days. Now it is retained indefinitely, so you can re-enroll your previously un-enrolled devices at any point of time. There is no setting to enable this feature, it is automatic.
     
  • Remote check-in all your shared iOS devices with the new Check In Device option.
    You can now remotely check-in a shared iOS device from the UEM console, which resets the device enrollment to the staging user with a prescribed organization group, profile, apps, and so on.
    Take advantage of this update by navigating to Devices > List View, and select the shared iOS device's Friendly Name to display Device Details. Then click the More Actions button and select Check In Device.
     
  • We have announced End of Availability for Mobile-Specific View in Workspace ONE UEM Console. 
    The mobile-specific view of the UEM console has reached end of availability and is no longer included in any of the UEM console releases. With the removal of the mobile-specific view, administrators are redirected to the full view of the UEM console regardless of  the device type. 
    Want to know more? Look for the End of Availability for Mobile-Specific View in Workspace ONE UEM Console
     knowledge base article on My Workspace ONE portal.
     
  • Highly secure mutual authentication between AirWatch Cloud Connector and Adaptiva Server.
    AirWatch Cloud Connector and Adaptiva Server communicate with each other with an increased level of trust and uses Transport Layer Security (TLS). To implement the enhanced mutual security authentication feature, upload an Adaptiva Public certificate while configuring your Peer Distribution software setup in the UEM console.

Content Gateway

  • We have announced End of Availability for ICAP-Proxy.
    Starting this release, ICAP Proxy configurations are no longer supported from the UEM console. All our existing customers can continue using the configuration till the End of General Support. Going forward, you will not be able to configure new ICAP-Proxy from Groups & Settings > All Settings > System > Enterprise Integration > Content Gateway and Groups & Settings > All Settings > Content > Remote Storage.
    Want to know more? Look for the End of General Support for VMware AirWatch ICAP-Proxy knowledge base article on My Workspace ONE portal.

Documentation

  • The evolution of Workspace ONE UEM product documentation.
    Workspace ONE UEM is always evolving, and so our documentation needs to adapt as well. Over the next few months, you'll see improvements to how our documentation looks and how it's organized.

iOS

  • Specify if the native mail Exchange connection should use OAuth to authenticate all your iOS 12 devices.
    The Exchange ActiveSync profile now specifies if the native mail Exchange connection should use OAuth for authenticating your iOS 12 devices. To enable the use of OAuth for authentication, select Use OAuth in the Exchange ActiveSync payload.

  • Troubleshooting of iOS 11+ devices just got easier with Remote View.
    With the Remote View feature, administrators can now easily initiate a remote view session of an iOS 11+ device from the UEM console and assist with troubleshooting by viewing the end user device. To make use of remote view, you must have purchased Advanced Remote Management SKU and must be using iOS Agent v5.8.1+. 
    To start, choose the Start Remote View action under More Actions > Support for each of the devices under the Device List View.  
     
  • Publish profiles to Apple devices more efficiently.
    Improved profile publishing when assigning to devices at scale.
     
  • Let your users decide whether they want to use S/MIME for signing and encryption on all iOS 12 devices.
    Email and Exchange payloads now allows the user to toggle S/MIME signing and S/MIME encryption for all your iOS 12 devices. You can also select S/MIME signing certificate​ and S/MIME encryption certificate for all your iOS 12 devices. 
     
  • Group all your app notifications on iOS 12 devices using all new "group notification type". 
    Notification payload now has a setting that helps you group app notifications. Take advantage of this update by using the Select group notification type under the Notifications payload. 
     
  • We made sure you don’t miss a critical notification because of your Do not disturb setting. 
    Notification payload now has a setting called Allow critical alert notifications that let's you mark an application notification as critical to bypass the Do Not Disturb ringer settings. 
     
  • Ever been disturbed by app notifications while driving? Now you can prevent application notifications from showing in CarPlay for all your iOS 12 devices.
    Notification payload now has a setting called Allow CarPlay that is used to prevent application notifications from being shown in the CarPlay.
     
  • Preserve your SIM data during a device wipe. 
    For devices below iOS 11, the device wipe command wipes the SIM data associated with the device. For iOS 11+ devices, you can preserve the SIM data plan (if it exists on the device) by selecting the Preserve Data Plan checkbox on the Device Wipe page before sending the device wipe command.
     
  • Skip the proximity setup while performing a device wipe on your iOS device. 
    For iOS 11.3+ devices, you have an additional option to skip the Proximity Setup screen in the Setup Assistant and this option prevent the user from seeing the Proximity Setup option.
     
  • Stop your users from changing the "Set Automatically" feature of Date & Time for an iOS device.
    Make use of the Force Date & Time to be Set Automatically settings under the Device Functionality subsection of the Restrictions payload to prevent users from changing the "Set Automatically" feature of Date & Time for an iOS device. 
     
  • Allow your users to control password autofill setting for all iOS 12+ Supervised devices.
    Use Allow auto filling of passwords settings under Device Functionality subsection of the Restrictions payload to control password autofill for iOS 12+ Supervised devices.
     
  • Added flexibility for Wi-Fi Password sharing for iOS 12+ Supervised devices. 
    Make use of Allow Sharing of Wi-Fi passwords settings under Device Functionality subsection of the Restrictions payload to prevent the sharing of Wi-Fi passwords from iOS 12+ Supervised device to a nearby device.
     
  • Stop your users from using the password autofill settings for iOS 11+ Supervised devices.
    Make use of Force authentication before auto-filling passwords setting under the Device Functionality subsection of the Restrictions payload to enforce authentication on all your iOS 11+ Supervised devices before auto filling passwords.
     
  • Stop your users from using unmanaged contacts in managed apps or managed contacts in unmanaged apps. 
    Restriction
     payload in the Data Loss Prevention subsection has a new feature that allows managed apps to read contacts from unmanaged contacts accounts. Take advantage of this new feature, by using Allow managed apps to read contacts from unmanaged contacts accounts or Allow unmanaged apps to read contacts from managed contacts accounts​ settings under the Data Loss Prevention subsection of the Restrictions payload.

macOS

  • Specify if the native mail Exchange connection should use OAuth for authenticating macOS 10.14 devices.
    The Exchange ActiveSync profile can now specify if the native mail Exchange connection should use OAuth for authenticating your macOS 10.14 devices. To enable the use of OAuth for authentication, you can select Use OAuth in the Exchange ActiveSync payload.
     
  • Stop your users from using the password autofill settings for all macOS 10.14 devices.
    Use Allow auto filling of passwords settings under Device Functionality subsection of the Restrictions payload to control password autofill for macOS 10.14 devices devices.
     
  • Added flexibility for Wi-Fi Password sharing for macOS 10.14 devices.
    Make use of Allow Sharing of Wi-Fi passwords settings under Device Functionality subsection of the Restrictions payload to prevent the sharing of Wi-Fi passwords from macOS 10.14 device to a nearby device.

Mobile Application Management

  • A better way of handling updates made to the most commonly accessed app sample table.
    Performance enhancements are made to the application sample collection and save process to reduce the number of read and write operations made to the most commonly accessed sample tables. The per-device-per-app application list time stamps are now converted to a per-device time stamp when the samples for all the applications are collected at once.
     
  • Added flexibility for uploading application as a link.
    Along with the support for uploading an application as a link with the supported file extension in the URL, you can now upload an application as a link if the URL contains query parameters at the end of the URL. 

Mobile Content Management

  • We have announced End of Availability for VMware Content Locker Outlook Add-In and VMware Content Locker for Windows Desktop. 
    The configuration settings for Outlook Add-In and Content Locker for Windows Desktop is no longer available in the UEM console as the General Support period for these applications has ended.
    Want to know more? Look for the End of General Support for VMware Content Locker Outlook Add-In knowledge base article on My Workspace ONE portal.

Printer

  • Start using the Avery Dennison 9485 printer in the UEM console.
    Printer Management support is extended for the Avery Dennison 9485 printer as a new OEM. You can now manage Avery Dennison printers in the same manner as other printers, such as Zebra and Epson, from the UEM console. With the current release, you can:
    • Enroll the Avery Dennison printer.
    • View the enrolled printer in the UEM console.
    • Unenroll the printer.
    • View details of the printer in the UEM console.
    • Push configuration files to the printer.

Rugged 

  • Let your users decide their Product Provisioning Deployment model.
    You can now choose how your product is deployed. Either use the default deployment mode (which is the relay server with a device services backup) or with only the relay server. Selecting relay server only frees the device server to devote its resources to other tasks. Make the choice for your own products by navigating to Devices > Staging & Provisioning > Product List View > Add Product and then select a platform.  The Deployment Mode drop-down in the Deployment tab is where you make this choice. 
     
  • The Apps/Search API just got better. Administrators can search for the applications that are deployed under Staging and Provisioning.
    The Apps/Search API has been enhanced to include applications uploaded under Staging & Provisioning and returns the application ID so that it can be subsequently used within the API flow.
     
  • Configure file server as a staging and provisioning component for all your Android devices.
    You can now have the File servers used as the source or destination of Download Files or Upload Files event actions. To configure a file server as a staging and provisioning component for all your Android products, navigate to Devices > Staging & Provisioning > Components > Event Actions and select the Add Event Action button. Select Android and at the Actions tab, choose either Download Files or Upload Files.
  • Use our new Role Based Access Control to reprocess a product. 
    Two new resources have been created allowing you to include permissions for product reprocessing when you make admin roles. Admins with this permission can reprocess a product on a specific device or they can request reprocessing for all the affected devices.
    To make an admin role with the reprocessing ability, navigate to Accounts > Administrators > Roles and select Add Role. On the Create Role page, enter reprocess in the Search Resources text box to use the new permissions.

SDK

  • We moved Compromised Protection and Offline Access for the Default SDK Profile to the Security Policies page.
    The SDK App Compliance page has been removed. However, we migrated the previous configurations for Compromised Protection and Offline Access for the Default SDK Profile to Groups & Settings > All Settings > Apps > Settings and Policies > Security Policies.
    Want to know more? Look for the "Changes to Compromised Protection and Offline Access SDK Settings Upon Upgrade" knowledge base article on My Workspace ONE portal.

Tunnel

  • Control inheritance for your Device Traffic Rules settings between organization groups.
    You can now choose to either inherit or override the Device Traffic Rules settings for all your child OGs. Make these changes in the Device Traffic Rules under VMware Tunnel > Network Traffic Rules. 

Windows

  • BitLocker enforcement just got better. Encryption profile lets you disable real-time enforcement on Windows Desktop devices.
    Previously, BitLocker encryption enforcement could cause issues when attempting to upgrade a device or to wipe it. Now you can disable real-time enforcement, so you can upgrade your Windows devices without BitLocker encryption issues.
     
  • Configure your Windows 10 device even before it even leaves the factory with the new Dell Provisioning for VMware Workspace ONE. 
    Workspace ONE UEM now supports creating a provisioning package for Windows 10 devices that you can send to Dell to configure your devices before they even ship. This process requires software distribution and the new VMware Workspace ONE Configuration Tool for Provisioning. Once the provisioning package is installed on your device, end users need only sign in to complete enrollment with their applications that are already installed. Dell takes these provisioning packages and installs them onto devices so your end users receive a device with all their apps already installed.

Resolved Issues

  • AAPP-5288 : Battery Level and Power Status in the Device Detail View shows conflicting data

  • AAPP-5349 : iOS Content Filter profile fails to install if the Title field is set blank

  • AAPP-5448 : VPP auto update remains in the pending check status and does not work as expected if the application is available only in Japan store

  • AAPP-5535 : Bootstrap package incorrectly pushes already enrolled devices on device Sync

  • AAPP-5547 : The annotation that is displayed for device pairing while creating a DEP profile does not convey the expected message

  • AAPP-5575 : Compliance violation push notification message is split into multiple messages if message body is over 240 bytes

  • AAPP-5594 : Delete device in bulk fails to follow the Managed wipe protection in the UEM console 

  • AAPP-5613 : iOS VPN profile does not allow addition of new Domains or DNS Servers in the Action Parameters profile configuration

  • AAPP-5618 : Device based VPP Boxer fails to receive the account host and account name fields from the UEM console

  • AAPP-5680 : macOS Printing Payload generates incorrect XML for Custom Driver

  • AAPP-5684 : Devices that respond with a Not Now for a command, removes the command from the queue and re-queues the command

  • AAPP-5716 : Child OG fails to clear APN certificate and inherits the APN certificate from the parent

  • AAPP-5721 : Modifying macOS wi-fi profile removes the password key

  • AAPP-5722 : L2TP VPN profile for macOS devices does not allow you to to select password as the authentication method

  • AGGL-2043 : AWCM deployment type does not honor the setting changes and is incorrectly defaulted to  "Always Running"

  • AGGL-3510 : Android For Work applications with user group assignment fails to trigger automatic application removal on removing a user from the user group

  • AGGL-3536 : Email password lookup in application configuration does not work for Android work managed devices

  • AGGL-3670 : Box for Android EMM does not work as expected

  • AGGL-3734: Application Control configuration settings does not work as expected

  • AGGL-4120: Public Apps are removed on switching single user staging user to end user

  • AGGL-4164 : Auto log-out for shared Android devices on Android Enterprise DO does not work as expected

  • AMST-8318 : MSI install status remains in the "Install Command Dispatched" state and does not show as "Installed" even if the application successfully installs on the device

  • AMST-8344 : Windows Updates profile fails to set Active Hours Start Time to a time later than Active Hours End Time

  • AMST-8459 : App install command line has a character limit of 256

  • AMST-8597 : BSP app installs as an online BSP app if the app is assigned Offline

  • APC-1231 : Override settings under the SDK App Compliance does not work as expected 

  • ARES-5930 : "Deployment Begins On" field in the App Assignment page is not set as a mandatory field that causes issues while publishing the application

  • ARES-6096 : Changing Profile from Optional to Auto, changes the Profile removal from Never to Always

  • ARES-6134 : Boxer configuration changed incorrectly on upgrading the UEM console from 9.1 to 9.3

  • ARES-6164 : Device search using the serial number as the search key fails to retrieve the search results for Public applications

  •  ARES-6242 : Certificate Profiles Install commands does not work as expected

  • ARES-6268 : Copying a profile fails to create a new UUID for the child OG

  • ARES-6372 : The pop-up window that demands for the user's confirmation on profile deactivation does not  specify the name of the profile in the confirmation alert

  • ARES-6427 : Device enrollment decision to install certificate profile is done based on "Install Certificate Profiles Without Batching on Enrollment"

  • ARES-6440: Managed Access button user experience is inconsistent.

  •  CMCM-187917 : Content List View displays incorrect details

  • CMEM-184751 : Boxer assignment change fails to trigger PS Set-CasMailbox command once second Assignment is promoted in priority

  • CMEM-184777 : Devices that are enrolled to the child OG with memconfig, fails to whitelist the device on Secure Email Gateway

  • CMEM-184813 : Inbox Profile removal incorrectly sets the EasProfileInstall to 0 for the Boxer record if both Boxer and Inbox Profiles are on an enrolled device

  • CMSVC-6369 : Admin group user list does not honor the Admin role permission

  • CMSVC-7039 : Device search using MacAddress results in incorrect API response

  • CMSVC-7090 : Groups that are moved to pending approval status throws on error on clicking view and merge

  • CMSVC-7255 : System app is listed under compliance violation list when a white-list app group compliance policy is violated

  • CMSVC-7282 : Public Apps API throws an error due to data truncation in the encrypted user information

  • CMSVC-7291 : Directory Services test connection fails if the Bind Password has "<" + strings

  • CMSVC-7499 : User groups get stuck at pending approval due to merge failure

  • CMSVC-7536 : Profile Refresh Interval does not display 10 hours in the sample interval value

  • CRSVC-2827: Event log date range filter does not work as expected

  • CRSVC-3525 : Integrated auth fails on VMware Browser when moving a device from one OG to another

  • CRSVC-3532 : Enable Certificate Revocation checkbox in the Entrust CA template is removed on saving and reopening the template

  • CRSVC-3869 : iOS mobile single-sign installation on a profile using the internal AirWatch CA fails

  • CRSVC-3589 : Device friendly name is incorrectly displayed in the syslog server

  • ENRL-277 : Container enrollment fails if the device is whitelisted using serial number or the IMEI number

  • ENRL-307 : App removal log incorrectly shows under Devices > Lifecycle > Wipe log

  • ENRL-319 : End user license agreement does not work as expected in the UEM console

  • ENRL-345 : Email user name attribute is changed from UPN to Username when the device registration is successful

  • ENRL-352 : Device list view screen displays the un-enrolled devices even if the Display Expected Devices is disabled 

  • ENRL-435 : Device Un-enroll Notification on deleting a device from Device List View does not work as expected
     

  • FBI-178015 : Device Location Log report does not honor the daylight savings time

  • FCA-187207 : Privacy settings is displayed on device record even if the setting is disabled

  • FBI-178016 : Profile Configuration Settings Report does not execute application control payload profile

  • FCA-187046 : Device List View export contains blank spaces in the Ownership column

  • FCA-187135 : Application and the Profile list cannot be scrolled if viewing the device details from SSP

  • FCA-187140 :  Device Friendly Name that contains Japanese characters is displayed in the HTML character codes on the browser tab

  • FCA-187214 : View Plan drop-down menu and the Plan Utilization Text in the Telecom Dashboard has user interface design issues 

  • FDB-1874: GPS data log throws Arithmetic overflow error.

  • FDB-1926 : ManagedApplicationList table incorrectly removes large numbers of records and the device inserts newer samples

  • FDB-1963 : OGs fail to delete because of FK error on the DeviceTag

  • RUGG-4826 : REST API call for the Windows mobile devices push notification does not work as expected

  • RUGG-4860 : File Action removal under Product Provisioning fails to remove the File Action from the inventory sample in the UEM Console

  • RUGG-5006 : Setting the Provisioning Policy to Read and Reprocess Product to Edit does not the honor force reprocess. It its required to set the Provisioning Policy to Edit in order to force reprocess

  • RUGG-5115 : Tab name and the new line characters fail to trim the Files/Actions name that is created using the maintainfileaction API

  • RUGG-5253 : PushDeviceandPolicyonQueue API does not work as expected

  • RUGG-5441 : ReprocessDevicePolicy role depends on ProvisioningPolicyEdit role to reprocess the product

Known Issues

  • AAPP- 5782: AllowManagement does not work as expected. 

    AllowManagement does not work as expected on changing the priority of assignments.

    There is no known workaround at this point.

  • AAPP-5784: VPP License fails to revoke on check-out if different AppID is assigned.

    If different AppID is assigned, VPP License fails to revoke on check-out.

    There is no known workaround at this point.

  • AAPP-5805: Unassigned VPP applications may be installed if a license is shared for the application.

    Unassigned VPP applications may be installed if a license is shared for the application (assigned at another OG).

    There is no known workaround at this point.

  • AAPP-5945 : Viewing or editing profiles with Notification payload does not work as expected.

    Unable to view or edit profiles with Notification payload. Administrators see an error ‘Something unexpected happened. If the issue persists, please contact your system administrator’. 

    There is no known workaround at this point.

  • AGGL-4127​: Android for work settings does not work as expected when Enrollment OG is assigned for a user.

    When configuring enrollment OG for a user, Managed Apps are not displayed for the user even if the OG setting is set to use Android for Work.

    There is no known workaround at this point.

  • AGGL-4141: Device Details page does not display the Device asset number specified on the Android device during direct enrollment.

    The Device Details page does not display the Device asset number specified on the Android device during direct enrollment.

    There is no known workaround at this point.

  • AGGL-4149 ​: Passcode profile does not honor the deployment mode. 

    Passcode profile is pushed automatically regardless of the deployment mode.

    There is no known workaround at this point.

  • AGGL-4155 : Android Enterprise check-in check-out fails in the console.

    Auto log-out for shared Android devices on Android Enterprise does not work as expected.

    There is no known workaround at this point.

  • AGGL-4169 : Inactive Passcode profiles are prompted during enrollment.

    Inactive Passcode profiles are promoted during Agent or the Hub app enrollment. Enrollment should not prompt for the Passcode as the Passcode profile is not active. 

    To overcome the issue, bypass Passcode screen by using the suspend or resume option on the device. 

  • AGGL-4170: Globalization issues in 9.7 UEM console.

    Some of the UI labels in the UEM console does not get globalized as expected.

    There is no known workaround at this point.

  • AMST- 8794: SCEP cert fails to land on the device.

    When using SCEP payload, the profile displays as installed but the certificate fails to land on the device.

    There is no known workaround at this point.

  • AMST- 9767: Interactive profile fails to install on the device.

    The credentials profile fails to land on the device when using the interactive profile deployment option.

    The auto and optional profile deployment option allows the user to receive the certificate profile.

  • ARES-6002: Resource deletion fails to delete the smart group entity mapping entry.

    Deleting a resource with assignment resources gets deleted in the user interface, but the assignment fails to delete in the database.

    There is no known workaround at this point.

  • ARES-6307: Dynamic Size in interrogator application list does not update when the app size changes.

    When the app size changes on the device, it fails to reflect in the interrogator.application(list) tables and reports a wrong value.

    There is no known workaround at this point.

  • ARES-6387: Default apps storage exceeds 20GB.

    SaaS customers are entitled to receive 25GB  of data storage for apps and content. Currently, when a new customer OG is created, the default split is 25 GB for apps and 5 GB for content and hence our customers are getting an additional data storage of 5 GB.

    There is no known workaround at this point.

  • ARES-6449: Password response to/AirWatch/ProfileResource/Edit/ProfileResourceEdit/<resourceID> is transmitted as plaintext.

    Password response to/AirWatch/ProfileResource/Edit/ProfileResourceEdit/<resourceID> does not honor authorization, and is transmitted as plaintext.

    There is no known workaround at this point.

  • ARES-6479: Non-ASCII characters are not displayed correctly under DEVICES -> Resources -> Platforms.

    Non-ASCII characters are not displayed correctly in JA,KO, CN and TW locales.

    There is no known workaround at this point.

  • CMCM-187906: Option to download AirWatch PC Content Locker is available when Personal Content is disabled.

    Download AirWatch Content Locker option appears when Personal Content option is disabled in the UEM console.

    PC Content Locker is reached EOL,and is not supported.

  • CRSVC-3579: Help Page takes a longer time to load and occasionally throws a browser error while using Chrome.

    The help page pulls a list of APIs and stores it in the cache on each initial load. Loading the help page using a different load balanced server also counts it as an initial load and pulls a list of APIs which increases the load time.

    Ignore the browser error and wait approximately three minutes for the help page to load. 

  • CRSVC-3897: Changeog API help page contains incorrect parameter for organization group ID.

    Change OG API help page contains a parameter called 'organizationgroupid' which is incorrect. The parameter should be 'ogid'.

    To overcome the issue, use 'ogid' as a parameter instead of 'organizationgroupid' while calling the API to change the organization group. 

  • ENRL-275: Unable to enroll a Child OG through SAML.

    On enabling the Child OG, enrollment page fails to load and results in a blank screen after authentication.

    There is no known workaround at this point.

  • FCA-186837: Autocomplete does not work as expected on Chrome browsers.

    If autocomplete is enabled, entering options to a field in a modal, should retain the autocomplete values on the screen.

    To overcome the issue, disable autocomplete or use a different browser. no known workaround at this point.

  • FCA-187107: Since CAPTCHA is removed, High Alert and Strict modes does not work.

    CAPTCHA has been deprecated, making the Admin > Console Security > General page obsolete.

    There is no known workaround at this point.

  • FCA-187331: Device Traffic rules are not set automatically for Workspace One app by Mobile SSO wizard.

    Device Traffic rules does not work as expected for Workspace One app by Mobile SSO wizard.

    There is no known workaround at this point.

  • RUGG-5361: Activating the existing deactivated product after disabling the PD Granularity settings generates incorrect product xml.

    When a new product (P1) is created with Deployment mode as RS only, and its not activated, and if the Product Deployment Granularity settings is disabled and then on activating the product, product XML should display both RS and DS links as a part of the job xml. However, the product XML displays only the RS link.

    There is no known workaround at this point.

  • RUGG-5347: Device Count displays only complaint status in the View Dependent Products Modal.

    Device Count displays only complaint status in the View Dependent Products Modal.

    To check the compliance counts of devices go to the product list view page.

  • FCA- 187823: In multiple customer environments, after upgrading to 9.7, we experience a timeout when attempting to send a bulk message notification to devices.

    After upgrading to VMware Workspace ONE UEM v9.7, the Workspace ONE UEM console times out when you attempt to send a bulk message notification to devices.

  • CRSVC-3589: Device Friendly Name display as NA in the Syslog server

    Syslog configuration in the UEM Console supports the configuration of the message content which should be delivered to the Syslog server. In the Message content configuration one can also specify the device friendly name as the look up value so that this value gets replaced when the syslog message is constructed by the event framework to be send to Syslog server.

    For all the console events, since the device-friendly name does not apply, it is shown as “N/A” in the Syslog server.

    As a workaround, do not use device friendly name for identifying the device. The device friendly name is a dynamic value that can change over time and may lead to inconsistent logging.