You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: defender-endpoint/device-control-policies.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -79,7 +79,7 @@ Device control policies can be applied to users and/or user groups. On Windows,
79
79
80
80
- To create a rule for a user group on Windows and Intune, **either** create an entry with a `Sid` condition for each user group in a [rule] and target the policy to a machine group in Intune **or** create a rule without conditions and target the policy with Intune to the user group.
81
81
82
-
- On Mac, use Intune and target the policy to a user group in Entra Id.
82
+
- On Mac, use Intune and target the policy to a user group in Microsoft Entra ID.
83
83
84
84
> [!WARNING]
85
85
> Don't use both user/user group conditions in rules and user group targeting in Intune.
@@ -148,7 +148,7 @@ The following table provides more context for the XML code snippet:
148
148
|`Name`| String, the name of the policy and displays on the toast based on the policy setting. ||
149
149
|`IncludedIdList`| The groups that the policy applies to. If multiple groups are added, the media must be a member of each group in the list to be included. | The Group ID/GUID must be used at this instance. <br/><br/>The following example shows the usage of GroupID: `<IncludedIdList> <GroupId> {EAA4CCE5-F6C9-4760-8BAD-FDCC76A2ACA1}</GroupId> </IncludedIdList>`|
150
150
|`ExcludedIDList`| The groups that the policy doesn't apply to. If multiple groups are added, the media must be a member of a group in the list to be excluded. | The Group ID/GUID must be used at this instance. |
151
-
|`Entry`| One PolicyRule can have multiple entries; each entry with a unique GUID tells device control one restriction. | See Entry properties table below to get details. |
151
+
|`Entry`| One PolicyRule can have multiple entries; each entry with a unique GUID tells device control one restriction. | See the Entry Properties table in this article to get details. |
152
152
153
153
### [**JSON (Mac)**](#tab/JSON)
154
154
@@ -196,7 +196,7 @@ Device control policies define access (called an entry) for a set of devices. En
196
196
197
197
There are two types of entries: enforcement entries (Allow/Deny) and audit entries (AuditAllow/AuditDeny).
198
198
199
-
Enforcement entries for a rule are evaluated in order until all of the requested permissions have been matched. If no entries match a rule, then the next rule is evaluated. If no rules match, then the default is applied.
199
+
Enforcement entries for a rule are evaluated in order until all of the requested permissions are matched. If no entries match a rule, then the next rule is evaluated. If no rules match, then the default is applied.
200
200
201
201
### Audit entries
202
202
@@ -205,7 +205,7 @@ Audit events control the behavior when device control enforces a rule (allow/den
205
205
Device control can also create an event that is available in Advanced Hunting.
206
206
207
207
> [!IMPORTANT]
208
-
> There is a limit of 300 events per device per day. Audit entries are processed after the enforcement decision has been made. All corresponding audit entries are evaluated.
208
+
> There's a limit of 300 events per device per day. Audit entries are processed after the enforcement decision is made. All corresponding audit entries are evaluated.
0 commit comments