Skip to content

Commit 7fd0fe5

Browse files
author
Angela Fleischmann
authored
Update app-protection-policies.md
Replace html breaks with Markdown backslashes, add html para end tags, and delete html open para tags at the ends of lines.
1 parent c014365 commit 7fd0fe5

1 file changed

Lines changed: 11 additions & 11 deletions

File tree

memdocs/intune/apps/app-protection-policies.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -77,13 +77,13 @@ When you create an app protection policy for iOS/iPadOS and Android apps, you fo
7777
![Screenshot of the Basics page of the Create policy pane](./media/app-protection-policies/app-protection-add-policies-01.png)
7878

7979
5. Click **Next** to display the **Apps** page. \
80-
The **Apps** page allows you to choose how you want to apply this policy to apps on different devices. You must add at least one app.<p>
80+
The **Apps** page allows you to choose how you want to apply this policy to apps on different devices. You must add at least one app.
8181

8282
| Value/Option | Description |
8383
|:-------------|:-----------------------------------------------|
8484
| Target to apps on all devices types | Use this option to target your policy to apps on devices of any management state. Choose **No** to target apps on specific devices types. For information, see [Target app protection policies based on device management state](#target-app-protection-policies-based-on-device-management-state). |
8585
| Device types | Use this option to specify whether this policy applies to MDM managed devices or unmanaged devices. For iOS/iPadOS APP policies, select from **Unmanaged** and **Managed** devices. For Android APP policies, select from **Unmanaged**, **Android device administrator**, and **Android Enterprise**. |
86-
| Target policy to | In the **Target policy to** dropdown box, choose to target your app protection policy to **All Apps**, **Microsoft Apps**, or **Core Microsoft Apps**.<p><ul><li>**All Apps** includes all Microsoft and partner apps that have integrated the Intune SDK.</li><li>**Microsoft Apps** includes all Microsoft apps that have integrated the Intune SDK.</li><li>**Core Microsoft Apps** includes the following apps: Edge, Excel, Office, OneDrive, OneNote, Outlook, PowerPoint, SharePoint, Teams, To Do, and Word.</li></ul>Next, you can select **View a list of the apps that will be targeted** to view a list of the apps that will be affected by this policy.|
86+
| Target policy to | In the **Target policy to** dropdown box, choose to target your app protection policy to **All Apps**, **Microsoft Apps**, or **Core Microsoft Apps**.<p><ul><li>**All Apps** includes all Microsoft and partner apps that have integrated the Intune SDK.</li><li>**Microsoft Apps** includes all Microsoft apps that have integrated the Intune SDK.</li><li>**Core Microsoft Apps** includes the following apps: Edge, Excel, Office, OneDrive, OneNote, Outlook, PowerPoint, SharePoint, Teams, To Do, and Word.</li></ul></p>Next, you can select **View a list of the apps that will be targeted** to view a list of the apps that will be affected by this policy.|
8787
| Public apps | If you do not want to select one of the pre-defined app groups, you can choose to target individual apps by selecting **Selected apps** in the **Target policy to** dropdown box. Click **Select public apps** to select public apps to target. |
8888
| Custom apps | If you do not want to select one of the pre-defined app groups, you can choose to target individual apps by selecting **Selected apps** in the **Target policy to** dropdown box. Click **Select custom apps** to select custom apps to target based on a Bundle ID. You cannot choose a custom app when targeting all public apps in the same policy. |
8989

@@ -92,28 +92,28 @@ When you create an app protection policy for iOS/iPadOS and Android apps, you fo
9292
> [!NOTE]
9393
> **Public apps** are supported are apps from Microsoft and partners that are commonly used with Microsoft Intune. These Intune protected apps are enabled with a rich set of support for mobile application protection policies. For more information, see [Microsoft Intune protected apps](../apps/apps-supported-intune-apps.md). Custom apps are LOB apps that have been integrated with the Intune SDK or wrapped by the Intune App Wrapping Tool. For more information see [Microsoft Intune App SDK Overview](../developer/app-sdk.md) and [Prepare line-of-business apps for app protection policies](../developer/apps-prepare-mobile-application-management.md).
9494
95-
6. Click **Next** to display the **Data protection** page.<br>
95+
6. Click **Next** to display the **Data protection** page. \
9696
This page provides settings for data loss prevention (DLP) controls, including cut, copy, paste, and save-as restrictions. These settings determine how users interact with data in the apps that this app protection policy applies.​
9797

98-
**Data protection settings**:<br>
98+
**Data protection settings**: \
9999
- **iOS/iPadOS data protection** - For information, see [iOS/iPadOS app protection policy settings - Data protection](app-protection-policy-settings-ios.md#data-protection).
100100
- **Android data protection** - For information, see [Android app protection policy settings - Data protection](app-protection-policy-settings-android.md#data-protection).
101101

102-
7. Click **Next** to display the **Access requirements** page.<br>
102+
7. Click **Next** to display the **Access requirements** page. \
103103
This page provides settings to allow you to configure the PIN and credential requirements that users must meet to access apps in a work context.
104104

105-
**Access requirements settings**:<br>
105+
**Access requirements settings**: \
106106
- **iOS/iPadOS access requirements** - For information, see [iOS/iPadOS app protection policy settings - Access requirements](app-protection-policy-settings-ios.md#access-requirements).
107107
- **Android access requirements** - For information, see [Android app protection policy settings - Access requirements](app-protection-policy-settings-android.md#access-requirements).
108108

109-
8. Click **Next** to display the **Conditional launch** page.<br>
109+
8. Click **Next** to display the **Conditional launch** page. \
110110
This page provides settings to set the sign-in security requirements for your app protection policy. Select a **Setting** and enter the **Value** that users must meet to sign in to your company app. Then select the **Action** you want to take if users do not meet your requirements. In some cases, multiple actions can be configured for a single setting.
111111

112-
**Conditional launch settings**:<br>
112+
**Conditional launch settings**: \
113113
- **iOS/iPadOS conditional launch** - For information, see [iOS/iPadOS app protection policy settings - Conditional launch](app-protection-policy-settings-ios.md#conditional-launch).
114114
- **Android conditional launch** - For information, see [Android app protection policy settings - Conditional launch](app-protection-policy-settings-android.md#conditional-launch).
115115

116-
9. Click **Next** to display the **Assignments** page.<br>
116+
9. Click **Next** to display the **Assignments** page. \
117117
The **Assignments** page allows you to assign the app protection policy to groups of users. You must apply the policy to a group of users to have the policy take effect.
118118

119119
10. Click **Next: Review + create** to review the values and settings you entered for this app protection policy.
@@ -143,13 +143,13 @@ To see the effect of the changes immediately, the end user must sign out of the
143143

144144
3. Next to the section titled *Apps*, select **Edit**.
145145

146-
4. The **Apps** page allows you to choose how you want to apply this policy to apps on different devices. You must add at least one app.<p>
146+
4. The **Apps** page allows you to choose how you want to apply this policy to apps on different devices. You must add at least one app.
147147

148148
| Value/Option | Description |
149149
|:-------------|:-----------------------------------------------|
150150
| Target to apps on all devices types | Use this option to target your policy to apps on devices of any management state. Choose **No** to target apps on specific devices types. Additional app configuration may be required for this setting. For more information, see [Target app protection policies based on device management state](#target-app-protection-policies-based-on-device-management-state). |
151151
| Device types | Use this option to specify whether this policy applies to MDM managed devices or unmanaged devices. For iOS/iPadOS APP policies, select from **Unmanaged** and **Managed** devices. For Android APP policies, select from **Unmanaged**, **Android device administrator**, and **Android Enterprise**. |
152-
| Public apps | In the **Target policy to** dropdown box, choose to target your app protection policy to **All public apps**, **Microsoft Apps**, or **Core Microsoft Apps**. Next, you can select **View a list of the apps that will be targeted** to view a list of the apps that will be affected by this policy.<p>If needed, you can choose to target individual apps by clicking **Select public apps**. |
152+
| Public apps | In the **Target policy to** dropdown box, choose to target your app protection policy to **All public apps**, **Microsoft Apps**, or **Core Microsoft Apps**. Next, you can select **View a list of the apps that will be targeted** to view a list of the apps that will be affected by this policy.<p>If needed, you can choose to target individual apps by clicking **Select public apps**. </p> |
153153
| Custom apps | Click **Select custom apps** to select custom apps to target based on a Bundle ID. |
154154

155155
The app(s) you have selected will appear in the public and custom apps list.

0 commit comments

Comments
 (0)