From 2a4f7da2e0342e88ca4db6c15630fc2dd6fa34c2 Mon Sep 17 00:00:00 2001 From: Elizabeth Ross Date: Mon, 17 Apr 2017 17:08:07 -0700 Subject: [PATCH] Updated version --- windows/keep-secure/deploy-wip-policy-using-intune.md | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/windows/keep-secure/deploy-wip-policy-using-intune.md b/windows/keep-secure/deploy-wip-policy-using-intune.md index 1cd1e553df..15976bd8a0 100644 --- a/windows/keep-secure/deploy-wip-policy-using-intune.md +++ b/windows/keep-secure/deploy-wip-policy-using-intune.md @@ -14,8 +14,8 @@ localizationpriority: high # Deploy your Windows Information Protection (WIP) policy using Microsoft Azure Intune **Applies to:** -- Windows 10, version 1703 -- Windows 10 Mobile, version 1703 (except Microsoft Azure Rights Management, which is only available on the desktop) +- Windows 10, version 1607 and later +- Windows 10 Mobile, version 1607 and later (except Microsoft Azure Rights Management, which is only available on the desktop) After you’ve created your Windows Information Protection (WIP) policy, you'll need to deploy it to your organization's enrolled devices. Enrollment can be done for business or personal devices, allowing the devices to use your managed apps and to sync with your managed content and information. @@ -42,4 +42,4 @@ After you’ve created your Windows Information Protection (WIP) policy, you'll - [Create and deploy a VPN policy for Windows Information Protection (WIP) using Microsoft Azure Intune](create-vpn-and-wip-policy-using-intune.md) -- [General guidance and best practices for Windows Information Protection (WIP)](guidance-and-best-practices-wip.md) \ No newline at end of file +- [General guidance and best practices for Windows Information Protection (WIP)](guidance-and-best-practices-wip.md)