Skip to content

Commit 4926272

Browse files
authored
Merge pull request #6093 from MicrosoftDocs/master
11/10/2021 AM Publish
2 parents c9c57df + 7cbfb17 commit 4926272

3 files changed

Lines changed: 10 additions & 8 deletions

File tree

memdocs/intune/apps/app-protection-policies-access-actions.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ keywords:
88
author: Erikre
99
ms.author: erikre
1010
manager: dougeby
11-
ms.date: 04/27/2021
11+
ms.date: 11/09/2021
1212
ms.topic: how-to
1313
ms.service: microsoft-intune
1414
ms.subservice: apps
@@ -31,7 +31,7 @@ ms.collection: M365-identity-device-management
3131

3232
# Selectively wipe data using app protection policy conditional launch actions in Intune
3333

34-
Using Intune app protection policies, you can configure settings to block end users from accessing a corporate app or account. These settings target data relocation and access requirements set by your organization for things like jail-broken devices and minimum OS versions.
34+
Conditional launch actions within Intune app protection policies provide organizations the ability to block access or wipe org data when certain device or app conditions are not met.
3535

3636
You can explicitly choose to wipe your company's corporate data from the end user's device as an action to take for non-compliance by using these settings. For some settings, you will be able to configure multiple actions, such as block access and wipe data based on different specified values.
3737

memdocs/intune/apps/app-protection-policy-delivery.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ keywords:
88
author: Erikre
99
ms.author: erikre
1010
manager: dougeby
11-
ms.date: 03/25/2021
11+
ms.date: 11/09/2021
1212
ms.topic: conceptual
1313
ms.service: microsoft-intune
1414
ms.subservice: apps
@@ -35,22 +35,22 @@ Learn the different deployment windows for app protection policies to understand
3535

3636
## Delivery timing summary
3737

38-
Application protection policy delivery depends on the license state and Intune service registration for your users.
38+
App protection policy (APP) delivery depends on the license state and Intune service registration for your users.
3939

4040
| User State | App Protection behavior | Retry Interval (see note) | Why does this happen? |
4141
|-----------------------------------------------------|-------------------------------------------------------------------------------------------------|--------------------------------------------------------------------------------------|-----------------------------------------------------------------------------------------------------------|
4242
| Tenant Not Onboarded | Wait for next retry interval. App Protection is not active for the user. | 24 hours | Occurs when you have not setup your tenant for Intune. |
4343
| User Not Licensed | Wait for next retry interval. App Protection is not active for the user. | 12 hours - However, on Android devices this interval requires Intune APP SDK version 5.6.0 or later. Otherwise for Android devices, the interval is 24 hours. | Occurs when you have not licensed the user for Intune. |
4444
| User Not Assigned App Protection Policies | Wait for next retry interval. App Protection is not active for the user. | 12 hours | Occurs when you have not assigned APP settings to the user. |
4545
| User Assigned App Protection Policies but app is not defined in the App Protection Policies | Wait for next retry interval. App Protection is not active for the user. | 12 hours | Occurs when you have not added the app to APP. |
46-
| User Successfully Registered for Intune MAM | App Protection is applied per policy settings. Updates occur based on retry interval | Intune Service defined based on user load. Typically 30 mins. | Occurs when the user has successfully registered with the Intune service for MAM configuration. |
46+
| User Successfully Registered for Intune MAM | App Protection is applied per policy settings. Updates occur based on retry interval | Intune Service defined based on user load. Typically 30 mins. | Occurs when the user has successfully registered with the Intune service for APP configuration. |
4747

4848
> [!NOTE]
49-
> Retry intervals may require active app use to occur, meaning the app is launched and in use. If the retry interval is 24 hours and the user waits 48 hours to launch the app, the Application Protection client will retry at 48 hours.
49+
> Retry intervals may require active app use to occur, meaning the app is launched and in use. If the retry interval is 24 hours and the user waits 48 hours to launch the app, the Intune APP SDK will retry at 48 hours.
5050
5151
## Handling network connectivity issues
5252

53-
When user registration fails due to network connectivity issues an accelerated retry interval is used. The Application Protection client will retry at increasingly longer intervals until the interval reaches 60 minutes or a successful connection is made. The client will then continue to retry at 60 minute intervals until a successful connection is made. Then, the client will return to the standard retry interval based on the user state.
53+
When user registration fails due to network connectivity issues an accelerated retry interval is used. The Intune APP SDK will retry at increasingly longer intervals until the interval reaches 60 minutes or a successful connection is made. The Intune APP SDK will then continue to retry at 60 minute intervals until a successful connection is made. Then, the Intune APP SDK will return to the standard retry interval based on the user state.
5454

5555
## Next steps
5656

memdocs/intune/apps/app-protection-policy-settings-log.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ keywords:
88
author: Erikre
99
ms.author: erikre
1010
manager: dougeby
11-
ms.date: 10/27/2021
11+
ms.date: 11/09/2021
1212
ms.topic: troubleshooting
1313
ms.service: microsoft-intune
1414
ms.subservice: apps
@@ -76,6 +76,8 @@ The following tables list the App protection policy setting name and supported v
7676
| ManagedUniversalLinks | A list of universal links that allow data to be open in the corresponding managed apps​ | **Section**: Data protection<br>**Setting**: Select managed universal links |
7777
| MaxPinRetryExceededAction | 0 = Reset PIN<br>1 = Wipe data | **Section**: Conditional launch<br>**Setting**: Max PIN attempts​ |
7878
| MaxOsVersion​ | "0.0" = no maximum OS version​<br>anything else = maximum OS version​ | **Section**: Conditional launch<br>**Setting**: Max OS version with action Block access |
79+
| MaxOsVersionWarning​ | "0.0" = no maximum OS version​<br>anything else = maximum OS version​ | **Section**: Conditional launch<br>**Setting**: Max OS version with action Warn |
80+
| MaxOsVersion​Wipe | "0.0" = no maximum OS version​<br>anything else = maximum OS version​ | **Section**: Conditional launch<br>**Setting**: Max OS version with action Wipe data |
7981
| MinAppVersion​ | "0.0" = no minimum app version​<br>anything else = minimum app version | **Section**: Conditional launch<br>**Setting**: Min app version with action Block access |
8082
| MinAppVersionWarning​ | "0.0" = no minimum app version.<br>anything else = minimum app version​ | **Section**: Conditional launch<br>**Setting**: Min app version with action Warn |
8183
| MinAppVersionWipe | "0.0" = no minimum OS version​<br>anything else = minimum OS version​ | **Section**: Conditional launch<br>**Setting**: Min app version with action Wipe data |

0 commit comments

Comments
 (0)