Skip to content

Commit 7adcf1c

Browse files
author
Angela Fleischmann
authored
Update manage-microsoft-teams.md
Move note for Apply Conditional Access (whole section) to above the paragraph on line 47 to avoid back-to-back notes that don't align.
1 parent da6644c commit 7adcf1c

1 file changed

Lines changed: 5 additions & 5 deletions

File tree

memdocs/intune/apps/manage-microsoft-teams.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -41,14 +41,14 @@ The richest and broadest protection capabilities for Microsoft 365 data are avai
4141

4242
Organizations can use Azure AD Conditional Access policies to ensure that users can only access work or school content using Teams for iOS and Android. To do this, you will need a conditional access policy that targets all potential users. These policies are described in [Conditional Access: Require approved client apps or app protection policy](/azure/active-directory/conditional-access/howto-policy-approved-app-or-app-protection).
4343

44-
1. Follow the steps in [Require approved client apps or app protection policy with mobile devices](/azure/active-directory/conditional-access/howto-policy-approved-app-or-app-protection#require-approved-client-apps-or-app-protection-policy-with-mobile-devices), which allows Teams for iOS and Android, but blocks third-party OAuth capable mobile device clients from connecting to Microsoft 365 endpoints.
44+
> [!NOTE]
45+
> To leverage app-based conditional access policies, the Microsoft Authenticator app must be installed on iOS devices. For Android devices, the Intune Company Portal app is required. For more information, see [App-based Conditional Access with Intune](../protect/app-based-conditional-access-intune.md).
46+
47+
Follow the steps in [Require approved client apps or app protection policy with mobile devices](/azure/active-directory/conditional-access/howto-policy-approved-app-or-app-protection#require-approved-client-apps-or-app-protection-policy-with-mobile-devices), which allows Teams for iOS and Android, but blocks third-party OAuth capable mobile device clients from connecting to Microsoft 365 endpoints.
4548

4649
>[!NOTE]
4750
> This policy ensures mobile users can access all Microsoft 365 endpoints using the applicable apps.
4851
49-
> [!NOTE]
50-
> To leverage app-based conditional access policies, the Microsoft Authenticator app must be installed on iOS devices. For Android devices, the Intune Company Portal app is required. For more information, see [App-based Conditional Access with Intune](../protect/app-based-conditional-access-intune.md).
51-
5252
## Create Intune app protection policies
5353

5454
App Protection Policies (APP) define which apps are allowed and the actions they can take with your organization's data. The choices available in APP enable organizations to tailor the protection to their specific needs. For some, it may not be obvious which policy settings are required to implement a complete scenario. To help organizations prioritize mobile client endpoint hardening, Microsoft has introduced taxonomy for its APP data protection framework for iOS and Android mobile app management.
@@ -107,4 +107,4 @@ This configuration scenario only works with enrolled devices. However, any UEM p
107107
## Next steps
108108

109109
- [What are app protection policies?](app-protection-policy.md)
110-
- [App configuration policies for Microsoft Intune](app-configuration-policies-overview.md)
110+
- [App configuration policies for Microsoft Intune](app-configuration-policies-overview.md)

0 commit comments

Comments
 (0)