Skip to content

Commit 9321555

Browse files
author
Angela Fleischmann
authored
Merge pull request #7029 from MicrosoftDocs/main
Publish 03/14/2022 3:30 PM PT
2 parents 36f58da + 26c343f commit 9321555

3 files changed

Lines changed: 12 additions & 13 deletions

File tree

memdocs/intune/apps/app-protection-policy-settings-ios.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ There are three categories of policy settings: *Data relocation*, *Access requir
8383

8484
There are some exempt apps and platform services that Intune app protection policy may allow data transfer to and from in certain scenarios. This list is subject to change and reflects the services and apps considered useful for secure productivity.
8585

86-
Third party unmanaged apps can be added to the exemptions list which can allow data transfer exceptions. For additional details and examples, see [How to create exceptions to the Intune App Protection Policy (APP) data transfer policy](../apps/app-protection-policies-exception.md). The exempt unmanaged app must be invoked based on iOS URL protocol. For example, when data transfer exemption is added for an unmanaged app, it would still prevent users from cut, copy, and paste operations, if restricted by policy. This type of exemption would also prevent users from using **Open-in** action within a managed app to copy data to exempt app since it is not based on iOS URL protocol. For more information about **Open-in**, see [Use app protection with iOS apps](../apps/data-transfer-between-apps-manage-ios.md#use-open-in-management-to-protect-ios-apps-and-data).
86+
Third party unmanaged apps can be added to the exemptions list which can allow data transfer exceptions. For additional details and examples, see [How to create exceptions to the Intune App Protection Policy (APP) data transfer policy](../apps/app-protection-policies-exception.md). The exempt unmanaged app must be invoked based on iOS URL protocol. For example, when data transfer exemption is added for an unmanaged app, it would still prevent users from cut, copy, and paste operations, if restricted by policy. This type of exemption would also still prevent users from using **Open-in** action within a managed app to share or save data to exempt app since it is not based on iOS URL protocol. For more information about **Open-in**, see [Use app protection with iOS apps](../apps/data-transfer-between-apps-manage-ios.md#use-open-in-management-to-protect-ios-apps-and-data).
8787

8888
| App/service name(s) | Description |
8989
| ---- | --- |

memdocs/intune/protect/microsoft-tunnel-migrate-app.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -258,7 +258,7 @@ If you’re using only the Tunnel functionality from the Defender for Endpoint a
258258
5. If you’re using per-app VPN:
259259
1. Wait at least 10 minutes after creating the new VPN profile. After 10 minutes you can then change the app deployment assignments from the *Microsoft Tunnel (standalone client) (preview)* VPN profile to the new VPN profile for *Microsoft Tunnel (preview)*.
260260

261-
2. After the new VPN profile deploys to a device, that device must restart before the new VPN profile is used. To restart a device, see [remotely restart devices with Intune](/intune/remote-actions/device-restart.md).
261+
2. After the new VPN profile deploys to a device, that device must restart before the new VPN profile is used. To restart a device, see [remotely restart devices with Intune](/intune/remote-actions/device-restart).
262262

263263
## Next Steps
264264

windows-365/enterprise/get-cloud-pc-audit-logs-using-powershell.md

Lines changed: 10 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ To get audit log events for up to seven days for your Windows 365 tenant, follow
5050
2. Verify the installation by running this command:```Get-InstalledModule Microsoft.Graph```
5151
3. To get all Cloud PC Graph endpoints, run this command: ```Get-Command -Module Microsoft.Graph* *virtualEndpoint*```
5252

53-
### Sign in as test user
53+
### Sign in
5454

5555
1. Run either of these two commands:
5656
- ```Connect-MgGraph -Scopes "CloudPC.ReadWrite.All"```
@@ -62,9 +62,15 @@ To get audit log events for up to seven days for your Windows 365 tenant, follow
6262

6363
You can view audit data in multiple ways.
6464

65-
#### List audit events
65+
#### Get entire list of audit events, including the audit actor
6666

67-
To see a list of audit events, use the following command:
67+
To get the entire list of audit events including the actor (person who performed the action), use the following command:
68+
69+
```Get-MgDeviceManagementVirtualEndpointAuditEvent | Select-Object -Property Actor,ActivityDateTime,ActivityType,ActivityResult -ExpandProperty Actor | Format-Table UserId, UserPrincipalName, ActivityType, ActivityDateTime, ActivityResult```
70+
71+
#### Get a list of audit events
72+
73+
To get a list of audit events without the audit actor, use the following command:
6874

6975
```Get-MgDeviceManagementVirtualEndpointAuditEvent```
7076

@@ -74,14 +80,7 @@ To get only the top N events, use the following parameters: ```Get-MgDeviceManag
7480

7581
#### Get a single event by event ID
7682

77-
You can use the following command to a single event: ```Get-MgDeviceManagementVirtualEndpointAuditEvent -CloudPcAuditEventId {event ID}```
78-
79-
#### Get audit actor
80-
81-
You can also find out who performed an audit event by running the following commands:
82-
83-
```$res=Get-MgDeviceManagementVirtualEndpointAuditEvent -CloudPcAuditEventId {event ID}```dotnetcli
84-
```$res.Actor```
83+
You can use the following command to get a single audit event, where you will need to provide the {event ID}: ```Get-MgDeviceManagementVirtualEndpointAuditEvent -CloudPcAuditEventId {event ID}```
8584

8685
<!-- ########################## -->
8786
## Next steps

0 commit comments

Comments
 (0)