Skip to content

Commit b7d3dd2

Browse files
[Azure AD] Conditional Access - GitHub Issue 75556
1 parent 2dd2044 commit b7d3dd2

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/active-directory/conditional-access/concept-condition-filters-for-devices.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: conceptual
9-
ms.date: 05/18/2021
9+
ms.date: 05/19/2021
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -67,7 +67,7 @@ Policy 1: All users with the directory role of Global administrator, accessing t
6767
1. Confirm your settings and set **Enable policy** to **On**.
6868
1. Select **Create** to create to enable your policy.
6969

70-
Policy 2: All users with the directory role of Global administrator, accessing the Microsoft Azure Management cloud app, excluding filters for devices using rule expression device.extensionAttribute1 not equals SAW and for Access controls, Block.
70+
Policy 2: All users with the directory role of Global administrator, accessing the Microsoft Azure Management cloud app, excluding filters for devices using rule expression device.extensionAttribute1 equals SAW and for Access controls, Block.
7171

7272
1. Select **New policy**.
7373
1. Give your policy a name. We recommend that organizations create a meaningful standard for the names of their policies.

0 commit comments

Comments
 (0)