Skip to content

Commit 39eee1d

Browse files
authored
Merge pull request #4885 from MicrosoftDocs/master
7/14/2021 PM Publish
2 parents 99b4b0d + 2f37720 commit 39eee1d

9 files changed

Lines changed: 21 additions & 4 deletions

memdocs/intune/apps/app-configuration-policies-outlook.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -46,6 +46,9 @@ Organizations can use use Azure AD Conditional Access policies to ensure that us
4646

4747
3. Finally, follow [How to: Block legacy authentication to Azure AD with Conditional Access](/azure/active-directory/conditional-access/block-legacy-authentication) to block legacy authentication for other Exchange protocols on iOS and Android devices; this policy should target only Microsoft Exchange Online cloud app and iOS and Android device platforms. This ensures mobile apps using Exchange Web Services, IMAP4, or POP3 protocols with basic authentication cannot connect to Exchange Online.
4848

49+
> [!NOTE]
50+
> To leverage app-based conditional access policies, the Microsoft Authenticator app must be installed on iOS devices. For Android devices, the Intune Company Portal app is required. For more information, see [App-based Conditional Access with Intune](../protect/app-based-conditional-access-intune.md).
51+
4952
## Create Intune app protection policies
5053

5154
App Protection Policies (APP) define which apps are allowed and the actions they can take with your organization's data. The choices available in APP enable organizations to tailor the protection to their specific needs. For some, it may not be obvious which policy settings are required to implement a complete scenario. To help organizations prioritize mobile client endpoint hardening, Microsoft has introduced taxonomy for its APP data protection framework for iOS and Android mobile app management.

memdocs/intune/apps/app-protection-framework.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -225,4 +225,4 @@ Administrators can incorporate the above configuration levels within their ring
225225
- [How to create and deploy app protection policies with Microsoft Intune](app-protection-policies.md)
226226
- [Available Android app protection policy settings with Microsoft Intune](app-protection-policy-settings-android.md)
227227
- [Available iOS/iPadOS app protection policy settings with Microsoft Intune](app-protection-policy-settings-ios.md)
228-
- Third-party apps such as the Salesforce mobile app work with Intune in specific ways to protect corporate data. To learn more about how the Salesforce app in particular works with Intune (including MDM app configurations settings), see [Salesforce App and Microsoft Intune](https://aka.ms/intunesalesforce).
228+

memdocs/intune/apps/app-protection-policy.md

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -209,7 +209,7 @@ By default, there can only be one **Global** policy per tenant. However, you can
209209
While the **Global** policy applies to all users in your tenant, any standard Intune app protection policy will override these settings.
210210

211211
> [!NOTE]
212-
> The policy settings in the OneDrive Admin Center are no longer being updated. Microsoft Enpoint Manager may be used instead. For more information, see [Control access to features in the OneDrive and SharePoint mobile apps](/onedrive/control-access-to-mobile-app-features.md).
212+
> The policy settings in the OneDrive Admin Center are no longer being updated. Microsoft Enpoint Manager may be used instead. For more information, see [Control access to features in the OneDrive and SharePoint mobile apps](/onedrive/control-access-to-mobile-app-features).
213213
214214
## App protection features
215215

@@ -400,5 +400,4 @@ The app protection policy settings that leverage Google Play Protect APIs requir
400400

401401
[Available iOS/iPadOS app protection policy settings with Microsoft Intune](app-protection-policy-settings-ios.md)
402402

403-
## See also
404-
Third-party apps such as the Salesforce mobile app work with Intune in specific ways to protect corporate data. To learn more about how the Salesforce app in particular works with Intune (including MDM app configurations settings), see [Salesforce App and Microsoft Intune](https://aka.ms/intunesalesforce).
403+

memdocs/intune/apps/manage-microsoft-edge.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -55,6 +55,9 @@ Organizations can use Azure AD Conditional Access policies to ensure that users
5555
5656
With Conditional Access, you can also target on-premises sites that you have exposed to external users via the [Azure AD Application Proxy](/azure/active-directory/active-directory-application-proxy-get-started).
5757

58+
> [!NOTE]
59+
> To leverage app-based conditional access policies, the Microsoft Authenticator app must be installed on iOS devices. For Android devices, the Intune Company Portal app is required. For more information, see [App-based Conditional Access with Intune](../protect/app-based-conditional-access-intune.md).
60+
5861
## Create Intune app protection policies
5962

6063
App Protection Policies (APP) define which apps are allowed and the actions they can take with your organization's data. The choices available in APP enable organizations to tailor the protection to their specific needs. For some, it may not be obvious which policy settings are required to implement a complete scenario. To help organizations prioritize mobile client endpoint hardening, Microsoft has introduced taxonomy for its APP data protection framework for iOS and Android mobile app management.

memdocs/intune/apps/manage-microsoft-office.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -46,6 +46,9 @@ Organizations can use use Azure AD Conditional Access policies to ensure that us
4646
>[!NOTE]
4747
> This policy ensures mobile users can access all Office endpoints using the applicable apps.
4848
49+
> [!NOTE]
50+
> To leverage app-based conditional access policies, the Microsoft Authenticator app must be installed on iOS devices. For Android devices, the Intune Company Portal app is required. For more information, see [App-based Conditional Access with Intune](../protect/app-based-conditional-access-intune.md).
51+
4952
## Create Intune app protection policies
5053

5154
App Protection Policies (APP) define which apps are allowed and the actions they can take with your organization's data. The choices available in APP enable organizations to tailor the protection to their specific needs. For some, it may not be obvious which policy settings are required to implement a complete scenario. To help organizations prioritize mobile client endpoint hardening, Microsoft has introduced taxonomy for its APP data protection framework for iOS and Android mobile app management.

memdocs/intune/apps/manage-microsoft-teams.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,9 @@ Organizations can use use Azure AD Conditional Access policies to ensure that us
4242
>[!NOTE]
4343
> This policy ensures mobile users can access all Office endpoints using the applicable apps.
4444
45+
> [!NOTE]
46+
> To leverage app-based conditional access policies, the Microsoft Authenticator app must be installed on iOS devices. For Android devices, the Intune Company Portal app is required. For more information, see [App-based Conditional Access with Intune](../protect/app-based-conditional-access-intune.md).
47+
4548
## Create Intune app protection policies
4649

4750
App Protection Policies (APP) define which apps are allowed and the actions they can take with your organization's data. The choices available in APP enable organizations to tailor the protection to their specific needs. For some, it may not be obvious which policy settings are required to implement a complete scenario. To help organizations prioritize mobile client endpoint hardening, Microsoft has introduced taxonomy for its APP data protection framework for iOS and Android mobile app management.

windows-365/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,2 @@
1+
- name: Index
2+
href: index.md

windows-365/breadcrumb/toc.yml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
- name: Docs
2+
tocHref: /
3+
topicHref: /

windows-365/index.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
# Welcome to windows-365!

0 commit comments

Comments
 (0)