Skip to content

Commit 838a0b3

Browse files
1 parent 4c1eacd commit 838a0b3

1 file changed

Lines changed: 11 additions & 1 deletion

File tree

memdocs/intune/fundamentals/filters.md

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ keywords:
77
author: MandiOhlinger
88
ms.author: mandia
99
manager: dougeby
10-
ms.date: 07/26/2022
10+
ms.date: 09/29/2022
1111
ms.topic: conceptual
1212
ms.service: microsoft-intune
1313
ms.subservice: fundamentals
@@ -70,6 +70,16 @@ Before a policy is applied to a device, filters dynamically evaluate applicabili
7070

7171
4. You see the filter results based on the evaluation. For example, the app or policy applies, or they don't apply.
7272

73+
### Restrictions
74+
75+
There are some restrictions when creating filters:
76+
77+
- For each tenant, there can be up to 200 filters.
78+
- Each filter is limited to 3072 characters.
79+
- Devices must be enrolled in Intune. Filters can't be evaluated on devices that aren't enrolled. This behavior includes:
80+
- A restriction on the **Available with or without enrollment** app assignment intent
81+
- Devices that are targeted with Endpoint Security configuration using Microsoft Defender for Endoint integration, such as servers.
82+
7383
## Prerequisites
7484

7585
- Sign in as an Intune administrator. For more information on Intune roles, see [Role-based access control (RBAC) with Microsoft Intune](role-based-access-control.md).

0 commit comments

Comments
 (0)