You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: memdocs/intune/apps/app-protection-policy-settings-ios.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -83,7 +83,7 @@ There are three categories of policy settings: *Data relocation*, *Access requir
83
83
84
84
There are some exempt apps and platform services that Intune app protection policy may allow data transfer to and from in certain scenarios. This list is subject to change and reflects the services and apps considered useful for secure productivity.
85
85
86
-
Third party unmanaged apps can be added to the exemptions list which can allow data transfer exceptions. For additional details and examples, see [How to create exceptions to the Intune App Protection Policy (APP) data transfer policy](../apps/app-protection-policies-exception.md). The exempt unmanaged app must be invoked based on iOS URL protocol. For example, when data transfer exemption is added for an unmanaged app, it would still prevent users from cut, copy, and paste operations, if restricted by policy. This type of exemption would also prevent users from using **Open-in** action within a managed app to copy data to exempt app since it is not based on iOS URL protocol. For more information about **Open-in**, see [Use app protection with iOS apps](../apps/data-transfer-between-apps-manage-ios.md#use-open-in-management-to-protect-ios-apps-and-data).
86
+
Third party unmanaged apps can be added to the exemptions list which can allow data transfer exceptions. For additional details and examples, see [How to create exceptions to the Intune App Protection Policy (APP) data transfer policy](../apps/app-protection-policies-exception.md). The exempt unmanaged app must be invoked based on iOS URL protocol. For example, when data transfer exemption is added for an unmanaged app, it would still prevent users from cut, copy, and paste operations, if restricted by policy. This type of exemption would also still prevent users from using **Open-in** action within a managed app to share or save data to exempt app since it is not based on iOS URL protocol. For more information about **Open-in**, see [Use app protection with iOS apps](../apps/data-transfer-between-apps-manage-ios.md#use-open-in-management-to-protect-ios-apps-and-data).
Copy file name to clipboardExpand all lines: memdocs/intune/protect/microsoft-tunnel-migrate-app.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -258,7 +258,7 @@ If you’re using only the Tunnel functionality from the Defender for Endpoint a
258
258
5. If you’re using per-app VPN:
259
259
1. Wait at least 10 minutes after creating the new VPN profile. After 10 minutes you can then change the app deployment assignments from the *Microsoft Tunnel (standalone client) (preview)* VPN profile to the new VPN profile for *Microsoft Tunnel (preview)*.
260
260
261
-
2. After the new VPN profile deploys to a device, that device must restart before the new VPN profile is used. To restart a device, see [remotely restart devices with Intune](/intune/remote-actions/device-restart.md).
261
+
2. After the new VPN profile deploys to a device, that device must restart before the new VPN profile is used. To restart a device, see [remotely restart devices with Intune](/intune/remote-actions/device-restart).
You can use the following command to get a single audit event, where you will need to provide the {event ID}: ```Get-MgDeviceManagementVirtualEndpointAuditEvent -CloudPcAuditEventId {event ID}```
0 commit comments