Skip to content

Commit 5085fac

Browse files
committed
Update app-configuration-policies-outlook.md
1 parent 806ff92 commit 5085fac

1 file changed

Lines changed: 1 addition & 1 deletion

File tree

memdocs/intune/apps/app-configuration-policies-outlook.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ Organizations can use use Azure AD Conditional Access policies to ensure that us
4242
> [!NOTE]
4343
> This policy ensures mobile users can access all Microsoft 365 endpoints using the applicable apps.
4444
45-
2. Follow the steps in [Block Exchange ActiveSync on all devices](/azure/active-directory/conditional-access/howto-policy-approved-app-or-app-protection#block-exchange-activesync-on-all-devices) to block Exchange ActiveSync clients using basic authentication on non-mobile devices.
45+
2. Follow the steps in [Block Exchange ActiveSync on all devices](/azure/active-directory/conditional-access/howto-policy-approved-app-or-app-protection#block-exchange-activesync-on-all-devices), which prevents Exchange ActiveSync clients using basic authentication on non-mobile devices from connecting to Exchange Online.
4646

4747
The above policies leverage the grant access control [Require app protection policy](/azure/active-directory/active-directory-conditional-access-technical-reference), which ensures that an Intune App Protection Policy is applied to the associated account within Outlook for iOS and Android prior to granting access. If the user isn't assigned to an Intune App Protection Policy, isn't licensed for Intune, or the app isn't included in the Intune App Protection Policy, then the policy prevents the user from obtaining an access token and gaining access to messaging data.
4848

0 commit comments

Comments
 (0)