Update create-vpn-and-wip-policy-using-intune-azure.md

Line 46: fully-qualified > fully qualified
Line 56: newly-created > newly created 
[Scorecard](https://microsoft-ce-csi.acrolinx.cloud/api/v1/checking/scorecards/7ab0c172-8129-4e7b-868f-94341f64e533#CORRECTNESS)
This commit is contained in:
Angela Fleischmann 2023-03-09 14:13:30 -07:00 committed by GitHub
parent d439eba335
commit a5fe19c4b7
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -43,7 +43,7 @@ To associate your WIP policy with your organization's existing VPN policy, use t
- **Name**: Enter a name for your setting. For example, enter `EDPModeID`. - **Name**: Enter a name for your setting. For example, enter `EDPModeID`.
- **OMA-URI**: Enter `./Vendor/MSFT/VPNv2/YourVPNProfileName/EDPModeId`. - **OMA-URI**: Enter `./Vendor/MSFT/VPNv2/YourVPNProfileName/EDPModeId`.
- **Data type**: Select `String`. - **Data type**: Select `String`.
- **Value**: Type your fully-qualified domain that should be used by the OMA-URI setting. For example, enter `corp.contoso.com`. - **Value**: Type your fully qualified domain that should be used by the OMA-URI setting. For example, enter `corp.contoso.com`.
For more information on these settings, see [Use custom settings for Windows devices in Intune](/mem/intune/configuration/custom-settings-windows-10). For more information on these settings, see [Use custom settings for Windows devices in Intune](/mem/intune/configuration/custom-settings-windows-10).
@ -53,7 +53,7 @@ To associate your WIP policy with your organization's existing VPN policy, use t
After you've created your VPN policy, you'll need to deploy it to the same group you deployed your Windows Information Protection (WIP) policy. After you've created your VPN policy, you'll need to deploy it to the same group you deployed your Windows Information Protection (WIP) policy.
1. On the **App policy** blade, select your newly-created policy, select **User groups** from the menu that appears, and then select **Add user group**. 1. On the **App policy** blade, select your newly created policy, select **User groups** from the menu that appears, and then select **Add user group**.
A list of user groups, made up of all of the security groups in your Azure Active Directory, appear in the **Add user group** blade. A list of user groups, made up of all of the security groups in your Azure Active Directory, appear in the **Add user group** blade.