Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Added Note under Min OS Version Warn #4623

Open
wants to merge 1 commit into
base: main
Choose a base branch
from
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion memdocs/intune/apps/app-protection-policy-settings-ios.md
Original file line number Diff line number Diff line change
Expand Up @@ -175,7 +175,7 @@ By default, several settings are provided with pre-configured values and actions
| Setting | How to use |
|---------|------------|
| **Max OS version** | Specify a maximum iOS/iPadOS operating system to use this app.<p>*Actions* include: <br><ul><li>**Warn** - The user will see a notification if the iOS/iPadOS version on the device doesn't meet the requirement. This notification can be dismissed. </li><li>**Block access** - The user will be blocked from access if the iOS/iPadOS version on the device doesn't meet this requirement.</li><li>**Wipe data** - The user account that is associated with the application is wiped from the device. </li></ul><br>This entry can appear multiple times, with each instance supporting a different action.<br><br> This policy setting format supports either major.minor, major.minor.build, major.minor.build.revision. <br><br>**Note:** *Requires app to have Intune SDK version 14.4.0 or above.* |
| **Min OS version** | Specify a minimum iOS/iPadOS operating system to use this app.<p>*Actions* include: <br><ul><li>**Warn** - The user will see a notification if the iOS/iPadOS version on the device doesn't meet the requirement. This notification can be dismissed. </li><li>**Block access** - The user will be blocked from access if the iOS/iPadOS version on the device doesn't meet this requirement.</li><li>**Wipe data** - The user account that is associated with the application is wiped from the device. </li></ul> </li></ul>This entry can appear multiple times, with each instance supporting a different action.<br><br> This policy setting format supports either major.minor, major.minor.build, major.minor.build.revision. <br><br>**Note:** *Requires app to have Intune SDK version 7.0.1 or above.* |
| **Min OS version** | Specify a minimum iOS/iPadOS operating system to use this app.<p>*Actions* include: <br><ul><li>**Warn** - The user will see a notification if the iOS/iPadOS version on the device doesn't meet the requirement. This notification can be dismissed. Note: If you specify version 16.0 as example, devices with 16.0 will not be warned but any device with version upto 15.9.9 will be warned. </li><li>**Block access** - The user will be blocked from access if the iOS/iPadOS version on the device doesn't meet this requirement.</li><li>**Wipe data** - The user account that is associated with the application is wiped from the device. </li></ul> </li></ul>This entry can appear multiple times, with each instance supporting a different action.<br><br> This policy setting format supports either major.minor, major.minor.build, major.minor.build.revision. <br><br>**Note:** *Requires app to have Intune SDK version 7.0.1 or above.* |
| **Max PIN attempts** | Specify the number of tries the user has to successfully enter their PIN before the configured action is taken. If the user fails to successfully enter their PIN after the maximum PIN attempts, the user must reset their pin after successfully logging into their account and completing a multi-factor authentication (MFA) challenge if required. This policy setting format supports a positive whole number.<p>*Actions* include: <br><ul><li>**Reset PIN** - The user must reset their PIN.</li><li>**Wipe data** - The user account that is associated with the application is wiped from the device. </li></ul></li></ul> Default value = **5** |
| **Offline grace period** | The number of minutes that policy-managed apps can run offline. Specify the time (in minutes) before the access requirements for the app are rechecked.<p>*Actions* include: <br><ul><li>**Block access (minutes)** - The number of minutes that policy-managed apps can run offline. Specify the time (in minutes) before the access requirements for the app are rechecked. After the configured period expires, the app blocks access to work or school data until network access is available. The Offline grace period timer for blocking data access is calculated individually for each app based on last check-in with the Intune service. This policy-setting format supports a positive whole number.<br><br>Default value = **1440** minutes (24 hours) <br><br><b>Note:</b> Configuring the Offline grace period timer for blocking access to be less than the default value may result in more frequent user interruptions as policy is refreshed. Choosing a value of less than 30 mins isn't recommended as it may result in user interruptions at each application launch or resume.<br><br>**Note:** Stopping the Offline grace period policy refresh, including closing or suspending the application, will result in user interruption at the next app launch or resume.<p></li><li>**Wipe data (days)** - After this many days (defined by the admin) of running offline, the app will require the user to connect to the network and reauthenticate. If the user successfully authenticates, they can continue to access their data and the offline interval will reset. If the user fails to authenticate, the app will perform a selective wipe of the users' account and data. See [How to wipe only corporate data from Intune-managed apps](apps-selective-wipe.md) for more information on what data is removed with a selective wipe. The Offline grace period timer for wiping data is calculated individually for each app based on last check-in with the Intune service. This policy setting format supports a positive whole number. <br><br> Default value = **90 days** </li></ul>This entry can appear multiple times, with each instance supporting a different action. |
| **Jailbroken/rooted devices** | There is no value to set for this setting.<p>*Actions* include: <br><ul><li>**Block access** - Prevent this app from running on jailbroken or rooted devices. The user continues to be able to use this app for personal tasks, but must use a different device to access work or school data in this app.</li><li>**Wipe data** - The user account that is associated with the application is wiped from the device. </li></ul> |
Expand Down