mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 05:17:22 +00:00
Update create-vpn-and-wip-policy-using-intune-azure.md
Line 46: fully-qualified > fully qualified Line 56: newly-created > newly created [Scorecard](https://microsoft-ce-csi.acrolinx.cloud/api/v1/checking/scorecards/7ab0c172-8129-4e7b-868f-94341f64e533#CORRECTNESS)
This commit is contained in:
parent
d439eba335
commit
a5fe19c4b7
@ -43,7 +43,7 @@ To associate your WIP policy with your organization's existing VPN policy, use t
|
|||||||
- **Name**: Enter a name for your setting. For example, enter `EDPModeID`.
|
- **Name**: Enter a name for your setting. For example, enter `EDPModeID`.
|
||||||
- **OMA-URI**: Enter `./Vendor/MSFT/VPNv2/YourVPNProfileName/EDPModeId`.
|
- **OMA-URI**: Enter `./Vendor/MSFT/VPNv2/YourVPNProfileName/EDPModeId`.
|
||||||
- **Data type**: Select `String`.
|
- **Data type**: Select `String`.
|
||||||
- **Value**: Type your fully-qualified domain that should be used by the OMA-URI setting. For example, enter `corp.contoso.com`.
|
- **Value**: Type your fully qualified domain that should be used by the OMA-URI setting. For example, enter `corp.contoso.com`.
|
||||||
|
|
||||||
For more information on these settings, see [Use custom settings for Windows devices in Intune](/mem/intune/configuration/custom-settings-windows-10).
|
For more information on these settings, see [Use custom settings for Windows devices in Intune](/mem/intune/configuration/custom-settings-windows-10).
|
||||||
|
|
||||||
@ -53,7 +53,7 @@ To associate your WIP policy with your organization's existing VPN policy, use t
|
|||||||
|
|
||||||
After you've created your VPN policy, you'll need to deploy it to the same group you deployed your Windows Information Protection (WIP) policy.
|
After you've created your VPN policy, you'll need to deploy it to the same group you deployed your Windows Information Protection (WIP) policy.
|
||||||
|
|
||||||
1. On the **App policy** blade, select your newly-created policy, select **User groups** from the menu that appears, and then select **Add user group**.
|
1. On the **App policy** blade, select your newly created policy, select **User groups** from the menu that appears, and then select **Add user group**.
|
||||||
|
|
||||||
A list of user groups, made up of all of the security groups in your Azure Active Directory, appear in the **Add user group** blade.
|
A list of user groups, made up of all of the security groups in your Azure Active Directory, appear in the **Add user group** blade.
|
||||||
|
|
||||||
@ -64,4 +64,4 @@ After you've created your VPN policy, you'll need to deploy it to the same group
|
|||||||

|

|
||||||
|
|
||||||
>[!NOTE]
|
>[!NOTE]
|
||||||
>Help to make this topic better by providing us with edits, additions, and feedback. For info about how to contribute to this topic, see [Editing Windows IT professional documentation](https://github.com/Microsoft/windows-itpro-docs/blob/master/CONTRIBUTING.md).
|
>Help to make this topic better by providing us with edits, additions, and feedback. For info about how to contribute to this topic, see [Editing Windows IT professional documentation](https://github.com/Microsoft/windows-itpro-docs/blob/master/CONTRIBUTING.md).
|
||||||
|
Loading…
x
Reference in New Issue
Block a user