Skip to content

Commit db3d6a3

Browse files
committed
Update app-protection-framework.md
removed duplicate row
1 parent d4a7728 commit db3d6a3

1 file changed

Lines changed: 1 addition & 2 deletions

File tree

memdocs/intune/apps/app-protection-framework.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ keywords:
88
author: Erikre
99
ms.author: erikre
1010
manager: dougeby
11-
ms.date: 10/05/2021
11+
ms.date: 11/16/2021
1212
ms.topic: conceptual
1313
ms.service: microsoft-intune
1414
ms.subservice: apps
@@ -218,7 +218,6 @@ The policy settings enforced in level 3 include all the policy settings recommen
218218

219219
| Setting | Setting description | Value / Action | Platform | Notes |
220220
|----------------------------|--------------------------------------|-------------------|---------------------------------------|----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
221-
| Device conditions | Min OS version | *Format: Major.Minor<br> Example: 9.0* / Block access | Android | Microsoft recommends configuring the minimum Android major version to match the supported Android versions for Microsoft apps. OEMs and devices adhering to Android Enterprise recommended requirements must support the current shipping release + one letter upgrade. Currently, Android recommends Android 9.0 and later for knowledge workers. See [Android Enterprise Recommended requirements](https://www.android.com/enterprise/recommended/requirements/) for Android's latest recommendations |
222221
| Device conditions | Jailbroken/rooted devices | N/A / Wipe data | iOS/iPadOS, Android | |
223222
| Device conditions | Max allowed threat level | Secured / Block access | iOS/iPadOS, Android | <p>Unenrolled devices can be inspected for threats using Mobile Threat Defense. For more information, see [Mobile Threat Defense for unenrolled devices](../protect/mtd-enable-unenrolled-devices.md). </p><p> If the device is enrolled, this setting can be skipped in favor of deploying Mobile Threat Defense for enrolled devices. For more information, see [Mobile Threat Defense for enrolled devices](../protect/mtd-device-compliance-policy-create.md).</p> |
224223
| Device conditions | Max OS version | *Format: Major.Minor<br> Example: 11.0* / Block access | Android | Microsoft recommends configuring the maximum Android major version to ensure beta or unsupported versions of the operating system are not used. See [Android Enterprise Recommended requirements](https://www.android.com/enterprise/recommended/requirements/) for Android's latest recommendations |

0 commit comments

Comments
 (0)