You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Selectively wipe data using app protection policy conditional launch actions in Intune
33
33
34
-
Using Intune app protection policies, you can configure settings to block end users from accessing a corporate app or account. These settings target data relocation and access requirements set by your organization for things like jail-broken devices and minimum OS versions.
34
+
Conditional launch actions within Intune app protection policies provide organizations the ability to block access or wipe org data when certain device or app conditions are not met.
35
35
36
36
You can explicitly choose to wipe your company's corporate data from the end user's device as an action to take for non-compliance by using these settings. For some settings, you will be able to configure multiple actions, such as block access and wipe data based on different specified values.
| Tenant Not Onboarded | Wait for next retry interval. App Protection is not active for the user. | 24 hours | Occurs when you have not setup your tenant for Intune. |
43
43
| User Not Licensed | Wait for next retry interval. App Protection is not active for the user. | 12 hours - However, on Android devices this interval requires Intune APP SDK version 5.6.0 or later. Otherwise for Android devices, the interval is 24 hours. | Occurs when you have not licensed the user for Intune. |
44
44
| User Not Assigned App Protection Policies | Wait for next retry interval. App Protection is not active for the user. | 12 hours | Occurs when you have not assigned APP settings to the user. |
45
45
| User Assigned App Protection Policies but app is not defined in the App Protection Policies | Wait for next retry interval. App Protection is not active for the user. | 12 hours | Occurs when you have not added the app to APP. |
46
-
| User Successfully Registered for Intune MAM | App Protection is applied per policy settings. Updates occur based on retry interval | Intune Service defined based on user load. Typically 30 mins. | Occurs when the user has successfully registered with the Intune service for MAM configuration. |
46
+
| User Successfully Registered for Intune MAM | App Protection is applied per policy settings. Updates occur based on retry interval | Intune Service defined based on user load. Typically 30 mins. | Occurs when the user has successfully registered with the Intune service for APP configuration. |
47
47
48
48
> [!NOTE]
49
-
> Retry intervals may require active app use to occur, meaning the app is launched and in use. If the retry interval is 24 hours and the user waits 48 hours to launch the app, the Application Protection client will retry at 48 hours.
49
+
> Retry intervals may require active app use to occur, meaning the app is launched and in use. If the retry interval is 24 hours and the user waits 48 hours to launch the app, the Intune APP SDK will retry at 48 hours.
50
50
51
51
## Handling network connectivity issues
52
52
53
-
When user registration fails due to network connectivity issues an accelerated retry interval is used. The Application Protection client will retry at increasingly longer intervals until the interval reaches 60 minutes or a successful connection is made. The client will then continue to retry at 60 minute intervals until a successful connection is made. Then, the client will return to the standard retry interval based on the user state.
53
+
When user registration fails due to network connectivity issues an accelerated retry interval is used. The Intune APP SDK will retry at increasingly longer intervals until the interval reaches 60 minutes or a successful connection is made. The Intune APP SDK will then continue to retry at 60 minute intervals until a successful connection is made. Then, the Intune APP SDK will return to the standard retry interval based on the user state.
Copy file name to clipboardExpand all lines: memdocs/intune/apps/app-protection-policy-settings-log.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ keywords:
8
8
author: Erikre
9
9
ms.author: erikre
10
10
manager: dougeby
11
-
ms.date: 10/27/2021
11
+
ms.date: 11/09/2021
12
12
ms.topic: troubleshooting
13
13
ms.service: microsoft-intune
14
14
ms.subservice: apps
@@ -76,6 +76,8 @@ The following tables list the App protection policy setting name and supported v
76
76
| ManagedUniversalLinks | A list of universal links that allow data to be open in the corresponding managed apps |**Section**: Data protection<br>**Setting**: Select managed universal links |
77
77
| MaxPinRetryExceededAction | 0 = Reset PIN<br>1 = Wipe data |**Section**: Conditional launch<br>**Setting**: Max PIN attempts |
78
78
| MaxOsVersion | "0.0" = no maximum OS version<br>anything else = maximum OS version |**Section**: Conditional launch<br>**Setting**: Max OS version with action Block access |
79
+
| MaxOsVersionWarning | "0.0" = no maximum OS version<br>anything else = maximum OS version |**Section**: Conditional launch<br>**Setting**: Max OS version with action Warn |
80
+
| MaxOsVersionWipe | "0.0" = no maximum OS version<br>anything else = maximum OS version |**Section**: Conditional launch<br>**Setting**: Max OS version with action Wipe data |
79
81
| MinAppVersion | "0.0" = no minimum app version<br>anything else = minimum app version |**Section**: Conditional launch<br>**Setting**: Min app version with action Block access |
80
82
| MinAppVersionWarning | "0.0" = no minimum app version.<br>anything else = minimum app version |**Section**: Conditional launch<br>**Setting**: Min app version with action Warn |
81
83
| MinAppVersionWipe | "0.0" = no minimum OS version<br>anything else = minimum OS version |**Section**: Conditional launch<br>**Setting**: Min app version with action Wipe data |
0 commit comments