Skip to content

Commit 980a05f

Browse files
authored
Update app-protection-policy-settings-ios.md
1 parent 36f58da commit 980a05f

1 file changed

Lines changed: 1 addition & 1 deletion

File tree

memdocs/intune/apps/app-protection-policy-settings-ios.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ There are three categories of policy settings: *Data relocation*, *Access requir
8383

8484
There are some exempt apps and platform services that Intune app protection policy may allow data transfer to and from in certain scenarios. This list is subject to change and reflects the services and apps considered useful for secure productivity.
8585

86-
Third party unmanaged apps can be added to the exemptions list which can allow data transfer exceptions. For additional details and examples, see [How to create exceptions to the Intune App Protection Policy (APP) data transfer policy](../apps/app-protection-policies-exception.md). The exempt unmanaged app must be invoked based on iOS URL protocol. For example, when data transfer exemption is added for an unmanaged app, it would still prevent users from cut, copy, and paste operations, if restricted by policy. This type of exemption would also prevent users from using **Open-in** action within a managed app to copy data to exempt app since it is not based on iOS URL protocol. For more information about **Open-in**, see [Use app protection with iOS apps](../apps/data-transfer-between-apps-manage-ios.md#use-open-in-management-to-protect-ios-apps-and-data).
86+
Third party unmanaged apps can be added to the exemptions list which can allow data transfer exceptions. For additional details and examples, see [How to create exceptions to the Intune App Protection Policy (APP) data transfer policy](../apps/app-protection-policies-exception.md). The exempt unmanaged app must be invoked based on iOS URL protocol. For example, when data transfer exemption is added for an unmanaged app, it would still prevent users from cut, copy, and paste operations, if restricted by policy. This type of exemption would also still prevent users from using **Open-in** action within a managed app to share or save data to exempt app since it is not based on iOS URL protocol. For more information about **Open-in**, see [Use app protection with iOS apps](../apps/data-transfer-between-apps-manage-ios.md#use-open-in-management-to-protect-ios-apps-and-data).
8787

8888
| App/service name(s) | Description |
8989
| ---- | --- |

0 commit comments

Comments
 (0)