Skip to content

Commit 91a3248

Browse files
authored
Merge pull request #7685 from DanielEmerson/patch-20
Update app-protection-policy-settings-ios.md
2 parents 791305c + b52cdf2 commit 91a3248

1 file changed

Lines changed: 1 addition & 1 deletion

File tree

memdocs/intune/apps/app-protection-policy-settings-ios.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ There are three categories of policy settings: *Data relocation*, *Access requir
7878
| **Printing Org data** | Select **Block** to prevent the app from printing work or school data. If you leave this setting to **Allow**, the default value, users will be able to export and print all Org data. | **Allow** |
7979
| **Restrict web content transfer with other apps** | Specify how web content (http/https links) is opened from policy-managed applications. Choose from: <ul><li>**Any app**: Allow web links in any app.</li><li>**Intune Managed Browser**: Allow web content to open only in the Intune Managed Browser. This browser is a policy-managed browser.</li><li>**Microsoft Edge**: Allow web content to open only in the Microsoft Edge. This browser is a policy-managed browser.</li><li>**Unmanaged browser**: Allow web content to open only in the unmanaged browser defined by **Unmanaged browser protocol** setting. The web content will be unmanaged in the target browser.<br>**Note**: Requires app to have Intune SDK version 11.0.9 or later.</li></ul> If you're using Intune to manage your devices, see [Manage Internet access using managed browser policies with Microsoft Intune](manage-microsoft-edge.md).<br><br>If a policy-managed browser is required but not installed, your end users will be prompted to install the Microsoft Edge.<p>If a policy-managed browser is required, iOS/iPadOS Universal Links are managed by the **Allow app to transfer data to other apps** policy setting. <p>**Intune device enrollment**<br>If you are using Intune to manage your devices, see Manage Internet access using managed browser policies with Microsoft Intune. <p>**Policy-managed Microsoft Edge**<br>The Microsoft Edge browser for mobile devices (iOS/iPadOS and Android) supports Intune app protection policies. Users who sign in with their corporate Azure AD accounts in the Microsoft Edge browser application will be protected by Intune. The Microsoft Edge browser integrates the Intune SDK and supports all of its data protection policies, with the exception of preventing:<br><ul><li>**Save-as**: The Microsoft Edge browser does not allow a user to add direct, in-app connections to cloud storage providers (such as OneDrive).</li><li>**Contact sync**: The Microsoft Edge browser does not save to native contact lists.</li></ul><br>**Note**: *The Intune SDK cannot determine if a target app is a browser. On iOS/iPadOS devices, no other managed browser apps are allowed.* | **Not configured** |
8080
|<ul>**Unmanaged Browser Protocol** | Enter the protocol for a *single* unmanaged browser. Web content (http/https links) from policy managed applications will open in any app that supports this protocol. The web content will be unmanaged in the target browser. <br><br>This feature should only be used if you want to share protected content with a specific browser that is not enabled using Intune app protection policies. You must contact your browser vendor to determine the protocol supported by your desired browser.<br><br>**Note**: *Include only the protocol prefix. If your browser requires links of the form `mybrowser://www.microsoft.com`, enter `mybrowser`.*<br>Links will be translated as:<br><ul><li>`http://www.microsoft.com` > `mybrowser://www.microsoft.com`</li><li>`https://www.microsoft.com` > `mybrowsers://www.microsoft.com`</li></ul> | **Blank** |
81-
| **Org data notifications** | Specify how Org data is shared via OS notifications for Org accounts. This policy setting will impact the local device and any connected devices such as wearables and smart speakers. Apps may provide additional controls to customize notification behavior or may choose to not honor all values. Select from: <ul><li>**Blocked**: Do not share notifications.</li><ul><li>If not supported by the application, notifications will be allowed.</li></ul><li>**Block org Data**: Do not share Org data in notifications, for example.</li><UL><li>"You have new mail"; "You have a meeting".</li><li>If not supported by the application, notifications will be blocked.</li></ul><li>**Allow**: Shares Org data in the notifications.</li></ul> <p>**Note**: *This setting requires app support: <ul><li>Outlook for iOS 4.34.0 or later</li><li>Teams for iOS 2.0.22 or later.*</ul> | **Allow** |
81+
| **Org data notifications** | Specify how Org data is shared via OS notifications for Org accounts. This policy setting will impact the local device and any connected devices such as wearables and smart speakers. Apps may provide additional controls to customize notification behavior or may choose to not honor all values. Select from: <ul><li>**Blocked**: Do not share notifications.</li><ul><li>If not supported by the application, notifications will be allowed.</li></ul><li>**Block org Data**: Do not share Org data in notifications, for example.</li><UL><li>"You have new mail"; "You have a meeting".</li><li>If not supported by the application, notifications will be allowed.</li></ul><li>**Allow**: Shares Org data in the notifications.</li></ul> <p>**Note**: *This setting requires app support: <ul><li>Outlook for iOS 4.34.0 or later</li><li>Teams for iOS 2.0.22 or later.*</ul> | **Allow** |
8282
> [!NOTE]
8383
> None of the data protection settings control the Apple managed open-in feature on iOS/iPadOS devices. To use manage Apple open-in, see [Manage data transfer between iOS/iPadOS apps with Microsoft Intune](data-transfer-between-apps-manage-ios.md).
8484

0 commit comments

Comments
 (0)