Skip to content

Commit 8c2a52a

Browse files
Update max allowed device threat levels in MTD integration documentation
1 parent a291e4e commit 8c2a52a

1 file changed

Lines changed: 3 additions & 3 deletions

File tree

intune/intune-service/apps/mamedge-3-scc.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Step 3. Integrate Mobile Threat Defense for App Protection Policy
33
description: Step 3. Integrate Mobile Threat Defense signals with Microsoft Edge for Business app protection policies in Microsoft Intune.
4-
ms.date: 01/23/2026
4+
ms.date: 01/26/2026
55
ms.topic: how-to
66
ms.reviewer: samarti
77
ms.custom:
@@ -64,13 +64,13 @@ Use the conditional launch settings to maintain progressive security across the
6464

6565
- **Offline grace period (Block access)**: Set to **10080** minutes.
6666
- **Offline grace period (Wipe data)**: Set to **90** days.
67-
- **Max allowed device threat level**: Select **Low**, with the **Block access** action.
67+
- **Max allowed device threat level**: Select **High**, with the **Block access** action.
6868

6969
#### Level 2 – Enhanced
7070

7171
- **Disabled account**: Set to **Block access**.
7272
- **Min OS version**: Enter **10.0.22621.2506** and select **Block access**.
73-
- **Max allowed device threat level**: Select **Medium**, with the **Block access** action.
73+
- **Max allowed device threat level**: Select **Low**, with the **Block access** action.
7474
- **Offline grace period (Wipe data)**: Set to **30** days.
7575

7676
#### Level 3 – High

0 commit comments

Comments
 (0)