diff --git a/intune/intune-service/apps/app-protection-policies-exception.md b/intune/intune-service/apps/app-protection-policies-exception.md index 6701cc735b2..85925d766cc 100644 --- a/intune/intune-service/apps/app-protection-policies-exception.md +++ b/intune/intune-service/apps/app-protection-policies-exception.md @@ -60,7 +60,7 @@ For a policy targeting Android, you can configure data transfer exceptions by ap By adding the **Webex** package as an exception to the MAM data transfer policy, Webex links inside a managed Outlook email message are allowed to open directly in the Webex application. Data transfer is still restricted in other unmanaged apps. - iOS/iPadOS **Webex** example: - To exempt the **Webex** app so that it's allowed to be invoked by Intune managed apps, you must add a data transfer exception for the following string: wbx + To exempt the **Webex** app so that it's allowed to be invoked by Intune managed apps, you must add a data transfer exception for the following string: wbx. To exempt the **Webex Meetings** app so that it's allowed to be invoked by Intune managed apps, you must add a data transfer exception for the following string: webexteams - iOS/iPadOS **Maps** example: To exempt the native **Maps** app so that it's allowed to be invoked by Intune managed apps, you must add a data transfer exception for the following string: maps