diff --git a/windows/keep-secure/create-edp-policy-using-intune.md b/windows/keep-secure/create-edp-policy-using-intune.md index 03dc49cc14..86a50cbecf 100644 --- a/windows/keep-secure/create-edp-policy-using-intune.md +++ b/windows/keep-secure/create-edp-policy-using-intune.md @@ -230,8 +230,8 @@ We recommend that you start with **Silent** or **Override** while verifying with Off EDP is turned off and doesn't help to protect or audit your data.

After you turn off EDP, an attempt is made to decrypt any closed EDP-tagged files on the locally attached drives. - - + + ![Microsoft Intune: Add the protection level for your Protected Apps list](images/intune-encryption-level.png) @@ -295,9 +295,9 @@ After you've added a protection level to your apps, you'll need to decide where Enterprise IPv6 Range **Starting IPv6 Address:** 2a01:110::
**Ending IPv6 Address:** 2a01:110:7fff:ffff:
ffff:ffff:ffff:ffff
**Custom URI:** 2a01:110::-2a01:110:7fff:ffff:ffff:ffff:ffff:ffff,
fd00::-fdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff Specify the addresses for a valid IPv6 value range within your intranet. These addresses, used with your Enterprise Network Domain Names, define your corporate network boundaries.

If you have multiple ranges, you must separate them using the "," delimiter. - - - + + + ![Microsoft Intune: Choose the primary domain and the other network locations for protected apps](images/intune-networklocation.png) 2. Add as many locations as you need, and then click **OK**.

The **Add or Edit Enterprise Network Locations box** closes.