Skip to content

Commit db0fc05

Browse files
updates
1 parent 39851e0 commit db0fc05

File tree

2 files changed

+99
-306
lines changed

2 files changed

+99
-306
lines changed

articles/active-directory/conditional-access/app-based-conditional-access.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.reviewer: spunukol
1515

1616
ms.collection: M365-identity-device-management
1717
---
18-
# How To: Require approved client apps for cloud app access with Conditional Access
18+
# How to: Require approved client apps for cloud app access with Conditional Access
1919

2020
People regularly use their mobile devices for both personal and work tasks. While making sure staff can be productive, organizations also want to prevent data loss from potentially unsecure applications. With Conditional Access, organizations can restrict access to approved (modern authentication capable) client apps.
2121

@@ -54,7 +54,7 @@ Organizations must complete the following three steps in order to require the us
5454
1. Confirm your settings and set **Enable policy** to **On**.
5555
1. Select **Create** to create and enable your policy.
5656

57-
**Step 2: Policy for Exchange ActiveSync clients requiring the use of an approved client app.**
57+
**Step 2: Configure an Azure AD Conditional Access policy for Exchange Online with ActiveSync (EAS)**
5858

5959
1. Browse to **Azure Active Directory** > **Security** > **Conditional Access**.
6060
1. Select **New policy**.

0 commit comments

Comments
 (0)