Skip to content

Commit 572c765

Browse files
author
Angela Fleischmann
authored
Merge pull request #7790 from MicrosoftDocs/main
Publish 06/09/2022 3:30 PM PT
2 parents 148c2bc + 7c1b876 commit 572c765

4 files changed

Lines changed: 12 additions & 11 deletions

File tree

memdocs/intune/fundamentals/licenses-assign.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: Erikre
88
ms.author: erikre
99
manager: dougeby
10-
ms.date: 12/16/2021
10+
ms.date: 06/09/2022
1111
ms.topic: how-to
1212
ms.service: microsoft-intune
1313
ms.subservice: fundamentals

memdocs/intune/fundamentals/migration-guide-app-protection-policies.md

Lines changed: 9 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ keywords:
88
author: Erikre
99
ms.author: erikre
1010
manager: dougeby
11-
ms.date: 12/16/2021
11+
ms.date: 06/09/2022
1212
ms.topic: conceptual
1313
ms.service: microsoft-intune
1414
ms.subservice: fundamentals
@@ -29,22 +29,19 @@ search.appverid: MET150
2929
ms.collection: M365-identity-device-management
3030
---
3131

32-
# Configure app protection policies (optional)
32+
# Configure app protection policies for migration (optional)
3333

34+
App protection policies (APP) are rules that ensure an organization's data remains safe or contained in a managed app. A policy can be a rule that is enforced when the user attempts to access or move "corporate" data, or a set of actions that are prohibited or monitored when the user is inside the app. A managed app is an app that has app protection policies applied to it, and can be managed by Intune.
3435

35-
App protection policies allow you to:
36+
App protection policies are often used to do the following tasks:
3637
* Encrypt apps
3738
* Define a PIN when the app is accessed
3839
* Block apps from running on jail-broken or rooted devices, and many other protections.
3940

40-
If the user's phone is lost or stolen, you can selectively wipe the corporate data remotely while leaving the personal data intact.
41+
For instance, if the user's phone is lost or stolen, you can selectively wipe the corporate data remotely while leaving the personal data intact.
4142

4243
App protection policies apply security at the app level and do not require device enrollment. You can use them with devices enrolled into Intune or not. Additionally, you can apply them to devices enrolled into a third-party MDM provider.
4344

44-
## App protection policies with LOB apps
45-
46-
You can also extend the mobile app protection policies to your line-of-business (LOB) apps by using the [Microsoft Intune App SDK](../developer/app-sdk-get-started.md) or the Microsoft Intune App Wrapping Tool for both iOS/iPadOS and Android platforms. For more information, see [App Wrapping Tool for iOS](../developer/app-wrapper-prepare-ios.md) and [App Wrapping Tool for Android](./../developer/app-wrapper-prepare-android.md). In addition, see [Prepare LOB apps for app protection](../developer/apps-prepare-mobile-application-management.md).
47-
4845
## How do app protection policies help during migration?
4946

5047
In a migration, you must remove devices from the old MDM provider and enroll them into Intune. You should plan for this and encourage your end-users to leave the old MDM provider and immediately enroll into Intune. However, during the migration there may be users who delay completing the enrollment process and whose devices are not managed by either MDM provider.
@@ -55,6 +52,10 @@ Intune can offer corporate data protections during the migration so you can stil
5552

5653
As you disable Conditional Access in the old MDM provider, users can still be productive while you on-board them into Intune.
5754

55+
## App protection policies with LOB apps
56+
57+
You can also extend the mobile app protection policies to your line-of-business (LOB) apps by using the [Microsoft Intune App SDK](../developer/app-sdk-get-started.md) or the Microsoft Intune App Wrapping Tool for both iOS/iPadOS and Android platforms. For more information, see [App Wrapping Tool for iOS](../developer/app-wrapper-prepare-ios.md) and [App Wrapping Tool for Android](./../developer/app-wrapper-prepare-android.md). In addition, see [Prepare LOB apps for app protection](../developer/apps-prepare-mobile-application-management.md).
58+
5859
## Task list for app protection policies
5960

6061
- [How to create and assign app protection policies](../apps/app-protection-policies.md)

windows-365/enterprise/known-issues-enterprise.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ Windows 365 provisioning failures may occur because both:
5555

5656
1. Did the Azure network connection (ANC) fail with the following error: `"An internal error occurred. The virtual machine deployment timed out."`?
5757
2. If yes, review the related GPO. Is PowerShell Execution set to AllSigned?
58-
3. If it is, either remove the GPO or reset the PowerShell Execution to RemoteSigned/ByPass.
58+
3. If it is, either remove the GPO or reset the PowerShell Execution to Unrestricted.
5959
4. Retry the ANC health check. If this succeeds, retry provisioning.
6060

6161
## Default and custom Enrollment Status Page profiles for Windows 365 Cloud PCs

windows-365/enterprise/troubleshooting.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ After the installation, the optimizations to redirect audio and video to your lo
4646

4747
## Conditional access
4848

49-
Make sure that you apply conditional access policies to the dedicated Windows 365 cloud app. You can apply these policies in the conditional access UI of Microsoft EndpointM Manager admin center or Azure Active Directory. The Windows 365 cloud app includes the Azure Virtual Desktop cloud app.
49+
Make sure that you apply conditional access policies to the both dedicated Windows 365 cloud app and the Azure Virtual Desktop cloud app. You can apply these policies in the conditional access UI of Microsoft Endpoint Manager admin center or Azure Active Directory.
5050

5151
Any conditional access policy that you apply will affect:
5252

0 commit comments

Comments
 (0)