mirror of
https://github.com/MicrosoftDocs/windows-itpro-docs.git
synced 2025-05-12 05:17:22 +00:00
Update create-vpn-and-wip-policy-using-intune-azure.md
Line 46: fully-qualified > fully qualified Line 56: newly-created > newly created [Scorecard](https://microsoft-ce-csi.acrolinx.cloud/api/v1/checking/scorecards/7ab0c172-8129-4e7b-868f-94341f64e533#CORRECTNESS)
This commit is contained in:
parent
d439eba335
commit
a5fe19c4b7
@ -43,7 +43,7 @@ To associate your WIP policy with your organization's existing VPN policy, use t
|
||||
- **Name**: Enter a name for your setting. For example, enter `EDPModeID`.
|
||||
- **OMA-URI**: Enter `./Vendor/MSFT/VPNv2/YourVPNProfileName/EDPModeId`.
|
||||
- **Data type**: Select `String`.
|
||||
- **Value**: Type your fully-qualified domain that should be used by the OMA-URI setting. For example, enter `corp.contoso.com`.
|
||||
- **Value**: Type your fully qualified domain that should be used by the OMA-URI setting. For example, enter `corp.contoso.com`.
|
||||
|
||||
For more information on these settings, see [Use custom settings for Windows devices in Intune](/mem/intune/configuration/custom-settings-windows-10).
|
||||
|
||||
@ -53,7 +53,7 @@ To associate your WIP policy with your organization's existing VPN policy, use t
|
||||
|
||||
After you've created your VPN policy, you'll need to deploy it to the same group you deployed your Windows Information Protection (WIP) policy.
|
||||
|
||||
1. On the **App policy** blade, select your newly-created policy, select **User groups** from the menu that appears, and then select **Add user group**.
|
||||
1. On the **App policy** blade, select your newly created policy, select **User groups** from the menu that appears, and then select **Add user group**.
|
||||
|
||||
A list of user groups, made up of all of the security groups in your Azure Active Directory, appear in the **Add user group** blade.
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user