Skip to content

Commit 558a431

Browse files
author
Angela Fleischmann
authored
Apply suggestions from code review
Replace spaces and backslashes with more spaces and backslashes.
1 parent d295156 commit 558a431

1 file changed

Lines changed: 4 additions & 4 deletions

File tree

memdocs/intune/apps/app-protection-policies.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -99,14 +99,14 @@ When you create an app protection policy for iOS/iPadOS and Android apps, you fo
9999
- **iOS/iPadOS data protection** - For information, see [iOS/iPadOS app protection policy settings - Data protection](app-protection-policy-settings-ios.md#data-protection).
100100
- **Android data protection** - For information, see [Android app protection policy settings - Data protection](app-protection-policy-settings-android.md#data-protection).
101101

102-
7. Click **Next** to display the **Access requirements** page. \
102+
7. Click **Next** to display the **Access requirements** page. \
103103
This page provides settings to allow you to configure the PIN and credential requirements that users must meet to access apps in a work context.
104104

105-
**Access requirements settings**: \
105+
**Access requirements settings**: \
106106
- **iOS/iPadOS access requirements** - For information, see [iOS/iPadOS app protection policy settings - Access requirements](app-protection-policy-settings-ios.md#access-requirements).
107107
- **Android access requirements** - For information, see [Android app protection policy settings - Access requirements](app-protection-policy-settings-android.md#access-requirements).
108108

109-
8. Click **Next** to display the **Conditional launch** page. \
109+
8. Click **Next** to display the **Conditional launch** page. \
110110
This page provides settings to set the sign-in security requirements for your app protection policy. Select a **Setting** and enter the **Value** that users must meet to sign in to your company app. Then select the **Action** you want to take if users do not meet your requirements. In some cases, multiple actions can be configured for a single setting.
111111

112112
**Conditional launch settings**: \
@@ -204,7 +204,7 @@ To create these policies, browse to **Apps** > **App protection policies** in th
204204

205205
On Android, Android devices will prompt to install the Intune Company Portal app regardless of which Device type is chosen. For example, if you select 'Android Enterprise' then users with unmanaged Android devices will still be prompted.
206206

207-
For iOS/iPadOS, for the 'Device type' selection to be enforced to Intune managed devices, additional app configuration settings are required. These configurations will communicate to the APP service that a particular app is managed - and that APP settings will not apply:
207+
For iOS/iPadOS, for the 'Device type' selection to be enforced to Intune managed devices, additional app configuration settings are required. These configurations will communicate to the APP service that a particular app is managedand that APP settings will not apply:
208208

209209
- **IntuneMAMUPN** must be configured for all MDM managed applications. For more information, see [How to manage data transfer between iOS/iPadOS apps in Microsoft Intune](data-transfer-between-apps-manage-ios.md#configure-user-upn-setting-for-microsoft-intune-or-third-party-emm).
210210
- **IntuneMAMDeviceID** must be configured for all third-party and line-of-business MDM managed applications. The **IntuneMAMDeviceID** should be configured to the device ID token. For example, `key=IntuneMAMDeviceID, value={{deviceID}}`. For more information, see [Add app configuration policies for managed iOS/iPadOS devices](app-configuration-policies-use-ios.md).

0 commit comments

Comments
 (0)