Update create-vpn-and-wip-policy-using-intune-azure.md

Line 46: fully-qualified > fully qualified
Line 56: newly-created > newly created 
[Scorecard](https://microsoft-ce-csi.acrolinx.cloud/api/v1/checking/scorecards/7ab0c172-8129-4e7b-868f-94341f64e533#CORRECTNESS)
This commit is contained in:
Angela Fleischmann 2023-03-09 14:13:30 -07:00 committed by GitHub
parent d439eba335
commit a5fe19c4b7
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -43,7 +43,7 @@ To associate your WIP policy with your organization's existing VPN policy, use t
- **Name**: Enter a name for your setting. For example, enter `EDPModeID`.
- **OMA-URI**: Enter `./Vendor/MSFT/VPNv2/YourVPNProfileName/EDPModeId`.
- **Data type**: Select `String`.
- **Value**: Type your fully-qualified domain that should be used by the OMA-URI setting. For example, enter `corp.contoso.com`.
- **Value**: Type your fully qualified domain that should be used by the OMA-URI setting. For example, enter `corp.contoso.com`.
For more information on these settings, see [Use custom settings for Windows devices in Intune](/mem/intune/configuration/custom-settings-windows-10).
@ -53,7 +53,7 @@ To associate your WIP policy with your organization's existing VPN policy, use t
After you've created your VPN policy, you'll need to deploy it to the same group you deployed your Windows Information Protection (WIP) policy.
1. On the **App policy** blade, select your newly-created policy, select **User groups** from the menu that appears, and then select **Add user group**.
1. On the **App policy** blade, select your newly created policy, select **User groups** from the menu that appears, and then select **Add user group**.
A list of user groups, made up of all of the security groups in your Azure Active Directory, appear in the **Add user group** blade.