You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: memdocs/intune/fundamentals/filters.md
+11-1Lines changed: 11 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ keywords:
7
7
author: MandiOhlinger
8
8
ms.author: mandia
9
9
manager: dougeby
10
-
ms.date: 07/26/2022
10
+
ms.date: 09/29/2022
11
11
ms.topic: conceptual
12
12
ms.service: microsoft-intune
13
13
ms.subservice: fundamentals
@@ -70,6 +70,16 @@ Before a policy is applied to a device, filters dynamically evaluate applicabili
70
70
71
71
4. You see the filter results based on the evaluation. For example, the app or policy applies, or they don't apply.
72
72
73
+
### Restrictions
74
+
75
+
There are some restrictions when creating filters:
76
+
77
+
- For each tenant, there can be up to 200 filters.
78
+
- Each filter is limited to 3072 characters.
79
+
- Devices must be enrolled in Intune. Filters can't be evaluated on devices that aren't enrolled. This behavior includes:
80
+
- A restriction on the **Available with or without enrollment** app assignment intent
81
+
- Devices that are targeted with Endpoint Security configuration using Microsoft Defender for Endoint integration, such as servers.
82
+
73
83
## Prerequisites
74
84
75
85
- Sign in as an Intune administrator. For more information on Intune roles, see [Role-based access control (RBAC) with Microsoft Intune](role-based-access-control.md).
0 commit comments