Skip to content

Commit ad38c3f

Browse files
authored
Apply suggestions from code review
1 parent 18d9142 commit ad38c3f

1 file changed

Lines changed: 2 additions & 2 deletions

File tree

memdocs/intune/fundamentals/whats-new.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -154,7 +154,7 @@ Applies to:
154154
#### New settings available in the iOS/iPadOS and macOS Settings Catalog<!-- 15349701 -->
155155
The [Settings Catalog](../configuration/settings-catalog.md) lists all the settings you can configure in a device policy, and all in one place.
156156

157-
There are new settings are available in the Settings Catalog. In the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), you can see these settings at **Devices** > **Configuration profiles** > **Create profile** > **iOS/iPadOS** or **macOS** for platform > **Settings catalog** for profile type.
157+
There are new settings available in the Settings Catalog. In the [Microsoft Endpoint Manager admin center](https://go.microsoft.com/fwlink/?linkid=2109431), you can see these settings at **Devices** > **Configuration profiles** > **Create profile** > **iOS/iPadOS** or **macOS** for platform > **Settings catalog** for profile type.
158158

159159
New settings include:
160160

@@ -236,7 +236,7 @@ For more information about protected apps, see [Microsoft Intune protected apps]
236236

237237
### Tenant administration
238238

239-
#### Access policies for multiple Administrator Approval in public preview<!--9348867 -->
239+
#### Access policies for Multiple Administrator Approval in public preview<!--9348867 -->
240240
In public preview, you can use Intune *access policies* to require that a second Administrator Approval account be used to approve a change before the change is applied. This capability is known as multiple Administrator Approval (MAA).
241241

242242
You create an access policy to protect a type of resource, like App deployments. Each access policy also includes a group of users who are *approvers* for the changes protected by the policy. When a resource like an app deployment configuration is protected by an access policy, any changes that are made to the deployment, including creating, deleting or modifying an existing deployment won't apply until a member of the approvers group for that access policy reviews and approves that change.

0 commit comments

Comments
 (0)