diff --git a/windows/keep-secure/create-vpn-and-wip-policy-using-intune.md b/windows/keep-secure/create-vpn-and-wip-policy-using-intune.md index 8f23e725f2..7af0659df5 100644 --- a/windows/keep-secure/create-vpn-and-wip-policy-using-intune.md +++ b/windows/keep-secure/create-vpn-and-wip-policy-using-intune.md @@ -28,13 +28,13 @@ Follow these steps to create the VPN policy you want to use with WIP.  -2. In the **Create Profile** pane, type *Contoso_VPN_Win10* into the **Name** box, add an optional description for your policy into the **Description** box, select **Windows 10 and later** from the **Platform** dropdown box, select **Custom** from the **Profile type** dropdown box, and then click **Configure**. +2. In the **Create Profile** blade, type *Contoso_VPN_Win10* into the **Name** box, add an optional description for your policy into the **Description** box, select **Windows 10 and later** from the **Platform** dropdown box, select **Custom** from the **Profile type** dropdown box, and then click **Configure**. -  +  -3. In the **Custom OMA-URI Settings** pane, click **Add**. +3. In the **Custom OMA-URI Settings** blade, click **Add**. -4. In the **Add Row** pane, type: +4. In the **Add Row** blade, type: - **Name.** Type _EDPModeID_ as the name. @@ -48,7 +48,7 @@ Follow these steps to create the VPN policy you want to use with WIP.  -5. Click **OK** to save your setting info in the **Add Row** pane, and then click **OK** in the **Custom OMA-URI Settings** pane to save the setting with your policy. +5. Click **OK** to save your setting info in the **Add Row** blade, and then click **OK** in the **Custom OMA-URI Settings** blade to save the setting with your policy. 6. Click **Create** to create the policy, including your OMA_URI info. @@ -57,9 +57,9 @@ After you’ve created your VPN policy, you'll need to deploy it to the same gro **To deploy your Custom VPN policy** -1. On the **App policy** pane, click your newly-created policy, click **User groups** from the menu that appears, and then click **Add user group**. +1. On the **App policy** blade, click your newly-created policy, click **User groups** from the menu that appears, and then click **Add user group**. - A list of user groups, made up of all of the security groups in your Azure Active Directory, appear in the **Add user group** pane. + A list of user groups, made up of all of the security groups in your Azure Active Directory, appear in the **Add user group** blade. 2. Choose the group you want your policy to apply to, and then click **Select** to deploy the policy. diff --git a/windows/keep-secure/create-wip-policy-using-intune.md b/windows/keep-secure/create-wip-policy-using-intune.md index f07725c541..c69915e085 100644 --- a/windows/keep-secure/create-wip-policy-using-intune.md +++ b/windows/keep-secure/create-wip-policy-using-intune.md @@ -36,14 +36,14 @@ After you’ve set up Intune for your organization, you must create a WIP-specif - **Enrollment state.** Choose **With enrollment** as the enrollment state for your policy. -  +  3. Click **Create**. The policy is created and appears in the table on the **App Policy** screen. >[!NOTE] - >Optionally, you can also add your apps and set your settings from the **Add a policy** pane, but for the purposes of this documentation, we recommend instead that you create the policy first, and then use the subsequent menus that become available. + >Optionally, you can also add your apps and set your settings from the **Add a policy** blade, but for the purposes of this documentation, we recommend instead that you create the policy first, and then use the subsequent menus that become available. ### Add apps to your Allowed apps list During the policy-creation process in Intune, you can choose the apps you want to give access to your enterprise data through WIP. Apps included in this list can protect data on behalf of the enterprise and are restricted from copying or moving enterprise data to unprotected apps. @@ -60,37 +60,37 @@ The steps to add your apps are based on the type of template being applied. You For this example, we’re going to add Microsoft Edge, a recommended app, to the **Allowed apps** list. **To add a recommended app** -1. From the **App policy** pane, click the name of your policy, and then click **Allowed apps** from the menu that appears. +1. From the **App policy** blade, click the name of your policy, and then click **Allowed apps** from the menu that appears. - The **Allowed apps** pane appears, showing you any apps that are already included in the list for this policy. + The **Allowed apps** blade appears, showing you any apps that are already included in the list for this policy. -  +  -2. From the **Allowed apps** pane, click **Add apps**. +2. From the **Allowed apps** blade, click **Add apps**. - The **Add apps** pane appears, showing you all **Recommended apps**. + The **Add apps** blade appears, showing you all **Recommended apps**.  3. Select each app you want to access your enterprise data, and then click **OK**. - The **Allowed apps** pane updates to show you your selected apps. + The **Allowed apps** blade updates to show you your selected apps. -  +  #### Add a Store app to your Allowed apps list For this example, we’re going to add Microsoft Power BI, a store app, to the **Allowed apps** list. **To add a Store app** -1. From the **App policy** pane, click the name of your policy, and then click **Allowed apps** from the menu that appears. +1. From the **App policy** blade, click the name of your policy, and then click **Allowed apps** from the menu that appears. - The **Allowed apps** pane appears, showing you any apps that are already included in the list for this policy. + The **Allowed apps** blade appears, showing you any apps that are already included in the list for this policy. -2. From the **Allowed apps** pane, click **Add apps**. +2. From the **Allowed apps** blade, click **Add apps**. -3. On the **Add apps** pane, click **Store apps** from the dropdown list. +3. On the **Add apps** blade, click **Store apps** from the dropdown list. - The pane changes to show boxes for you to add a publisher and app name. + The blade changes to show boxes for you to add a publisher and app name. 4. Type the name of the app and the name of its publisher, and then click **OK**. For this UWP app example, the **Publisher** is `CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US` and the Product **name** is `Microsoft.MicrosoftPowerBIForWindows`. @@ -155,15 +155,15 @@ If you don't know the publisher or product name, you can find them for both desk For this example, we’re going to add WordPad, a desktop app, to the **Allowed apps** list. **To add a Desktop app** -1. From the **App policy** pane, click the name of your policy, and then click **Allowed apps** from the menu that appears. +1. From the **App policy** blade, click the name of your policy, and then click **Allowed apps** from the menu that appears. - The **Allowed apps** pane appears, showing you any apps that are already included in the list for this policy. + The **Allowed apps** blade appears, showing you any apps that are already included in the list for this policy. -2. From the **Allowed apps** pane, click **Add apps**. +2. From the **Allowed apps** blade, click **Add apps**. -3. On the **Add apps** pane, click **Desktop apps** from the dropdown list. +3. On the **Add apps** blade, click **Desktop apps** from the dropdown list. - The pane changes to show boxes for you to add the following, based on what results you want returned: + The blade changes to show boxes for you to add the following, based on what results you want returned: