Skip to content

Commit 45c10e8

Browse files
author
Angela Fleischmann
authored
Merge pull request #8570 from Brenduns/maa-retraction
Reverting article publication
2 parents b8918a2 + be9a703 commit 45c10e8

3 files changed

Lines changed: 6 additions & 151 deletions

File tree

.openpublishing.redirection.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1216,6 +1216,11 @@
12161216
"source_path": "memdocs/analytics/productivity-score.md",
12171217
"redirect_url": "/mem/analytics/adoption-score",
12181218
"redirect_document_id": false
1219-
}
1219+
},
1220+
{
1221+
"source_path": "memdocs/intune/fundamentals/multi-admin-approval.md",
1222+
"redirect_url": "/mem/intune/fundamentals/whats-new",
1223+
"redirect_document_id": false
1224+
}
12201225
]
12211226
}

memdocs/intune/fundamentals/multi-admin-approval.md

Lines changed: 0 additions & 131 deletions
This file was deleted.

memdocs/intune/fundamentals/whats-new.md

Lines changed: 0 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -243,25 +243,6 @@ The following protected apps are now available for Microsoft Intune:
243243

244244
For more information about protected apps, see [Microsoft Intune protected apps](../apps/apps-supported-intune-apps.md).
245245

246-
### Tenant administration
247-
248-
#### Access policies for Multiple Administrator Approval in public preview<!--9348867 -->
249-
> [!NOTE]
250-
> This feature is delayed and is not yet available. We'll remove this note when this feature begins to roll out to tenants.
251-
252-
In public preview, you can use Intune *access policies* to require that a second Administrator Approval account be used to approve a change before the change is applied. This capability is known as multiple Administrator Approval (MAA).
253-
254-
You create an access policy to protect a type of resource, like App deployments. Each access policy also includes a group of users who are *approvers* for the changes protected by the policy. When a resource like an app deployment configuration is protected by an access policy, any changes that are made to the deployment, including creating, deleting or modifying an existing deployment won't apply until a member of the approvers group for that access policy reviews and approves that change.
255-
256-
Approvers can also reject requests, and both the individual requesting a change and the approver can provide notes about the change, or why it was approved or rejected.
257-
258-
Access policies are supported for the following resources:
259-
260-
- **Apps** – Applies to [app deployments](../apps/apps-add.md), but doesn't apply to app protection policies.
261-
- **Scripts** – Applies to deploying scripts to devices that run [macOS](../apps/macos-shell-scripts.md) or [Windows](../apps/intune-management-extension.md).
262-
263-
For more information, see [Use Access policies to require multiple administrative approval](../fundamentals/multi-admin-approval.md).
264-
265246
## Week of September 12, 2022
266247

267248
### Device management

0 commit comments

Comments
 (0)