diff --git a/intune/intune-service/apps/app-protection-policies-exception.md b/intune/intune-service/apps/app-protection-policies-exception.md
index 6701cc735b2..85925d766cc 100644
--- a/intune/intune-service/apps/app-protection-policies-exception.md
+++ b/intune/intune-service/apps/app-protection-policies-exception.md
@@ -60,7 +60,7 @@ For a policy targeting Android, you can configure data transfer exceptions by ap
By adding the **Webex** package as an exception to the MAM data transfer policy, Webex links inside a managed Outlook email message are allowed to open directly in the Webex application. Data transfer is still restricted in other unmanaged apps.
- iOS/iPadOS **Webex** example:
- To exempt the **Webex** app so that it's allowed to be invoked by Intune managed apps, you must add a data transfer exception for the following string: wbx
+ To exempt the **Webex** app so that it's allowed to be invoked by Intune managed apps, you must add a data transfer exception for the following string: wbx
. To exempt the **Webex Meetings** app so that it's allowed to be invoked by Intune managed apps, you must add a data transfer exception for the following string: webexteams
- iOS/iPadOS **Maps** example:
To exempt the native **Maps** app so that it's allowed to be invoked by Intune managed apps, you must add a data transfer exception for the following string: maps