You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: memdocs/intune/apps/app-protection-policies.md
+44-44Lines changed: 44 additions & 44 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ keywords:
8
8
author: Erikre
9
9
ms.author: erikre
10
10
manager: dougeby
11
-
ms.date: 03/29/2022
11
+
ms.date: 08/24/2022
12
12
ms.topic: how-to
13
13
ms.service: microsoft-intune
14
14
ms.subservice: apps
@@ -76,51 +76,49 @@ When you create an app protection policy for iOS/iPadOS and Android apps, you fo
76
76
77
77

78
78
79
-
5. Click **Next** to display the **Apps** page. The **Apps** page allows you to choose how you want to apply this policy to apps on different devices. **You must add at least one app.**
79
+
5. Click **Next** to display the **Apps** page. \
80
+
The **Apps** page allows you to choose how you want to apply this policy to apps on different devices. You must add at least one app.
80
81
81
82
| Value/Option | Description |
82
-
|:-----|:---------------|
83
-
|Target to apps on all devices types |Use this option to target your policy to apps on devices of any management state. Choose **No** to target apps on specific devices types. For information, see [Target app protection policies based on device management state](#target-app-protection-policies-based-on-device-management-state). |
84
-
|Device types | Use this option to specify whether this policy applies to MDM managed devices or unmanaged devices. For iOS/iPadOS APP policies, select from **Unmanaged** and **Managed** devices. For Android APP policies, select from **Unmanaged**, **Android device administrator**, and **Android Enterprise**. |
85
-
|Target policy to |In the **Target policy to** dropdown box, choose to target your app protection policy to **All Apps**, **Microsoft Apps**, or **Core Microsoft Apps**.
86
-
-**All Apps** includes all Microsoft and partner apps that have integrated the Intune SDK.
87
-
-**Microsoft Apps** includes all Microsoft apps that have integrated the Intune SDK.
88
-
-**Core Microsoft Apps** includes the following apps: Edge, Excel, Office, OneDrive, OneNote, Outlook, PowerPoint, SharePoint, Teams, To Do, and Word.
89
-
90
-
Next, you can select **View a list of the apps that will be targeted** to view a list of the apps that will be affected by this policy.|
91
-
|Public apps |If you do not want to select one of the pre-defined app groups, you can choose to target individual apps by selecting **Selected apps** in the **Target policy to** dropdown box. Click **Select public apps** to select public apps to target. |
92
-
|Custom apps |If you do not want to select one of the pre-defined app groups, you can choose to target individual apps by selecting **Selected apps** in the **Target policy to** dropdown box. Click **Select custom apps** to select custom apps to target based on a Bundle ID. You cannot choose a custom app when targeting all public apps in the same policy. |
| Target to apps on all devices types | Use this option to target your policy to apps on devices of any management state. Choose **No** to target apps on specific devices types. For information, see [Target app protection policies based on device management state](#target-app-protection-policies-based-on-device-management-state). |
85
+
| Device types | Use this option to specify whether this policy applies to MDM managed devices or unmanaged devices. For iOS/iPadOS APP policies, select from **Unmanaged** and **Managed** devices. For Android APP policies, select from **Unmanaged**, **Android device administrator**, and **Android Enterprise**. |
86
+
| Target policy to | In the **Target policy to** dropdown box, choose to target your app protection policy to **All Apps**, **Microsoft Apps**, or **Core Microsoft Apps**.<p><ul><li>**All Apps** includes all Microsoft and partner apps that have integrated the Intune SDK.</li><li>**Microsoft Apps** includes all Microsoft apps that have integrated the Intune SDK.</li><li>**Core Microsoft Apps** includes the following apps: Edge, Excel, Office, OneDrive, OneNote, Outlook, PowerPoint, SharePoint, Teams, To Do, and Word.</li></ul></p>Next, you can select **View a list of the apps that will be targeted** to view a list of the apps that will be affected by this policy.|
87
+
| Public apps | If you do not want to select one of the pre-defined app groups, you can choose to target individual apps by selecting **Selected apps** in the **Target policy to** dropdown box. Click **Select public apps** to select public apps to target. |
88
+
| Custom apps | If you do not want to select one of the pre-defined app groups, you can choose to target individual apps by selecting **Selected apps** in the **Target policy to** dropdown box. Click **Select custom apps** to select custom apps to target based on a Bundle ID. You cannot choose a custom app when targeting all public apps in the same policy. |
93
89
94
90
The app(s) you have selected will appear in the public and custom apps list.
95
91
96
-
> [!NOTE]
97
-
> **Public apps** are supported are apps from Microsoft and partners that are commonly used with Microsoft Intune. These Intune protected apps are enabled with a rich set of support for mobile application protection policies. For more information, see [Microsoft Intune protected apps](../apps/apps-supported-intune-apps.md). Custom apps are LOB apps that have been integrated with the Intune SDK or wrapped by the Intune App Wrapping Tool. For more information see [Microsoft Intune App SDK Overview](../developer/app-sdk.md) and [Prepare line-of-business apps for app protection policies](../developer/apps-prepare-mobile-application-management.md).
92
+
> [!NOTE]
93
+
> **Public apps** are supported are apps from Microsoft and partners that are commonly used with Microsoft Intune. These Intune protected apps are enabled with a rich set of support for mobile application protection policies. For more information, see [Microsoft Intune protected apps](../apps/apps-supported-intune-apps.md). Custom apps are LOB apps that have been integrated with the Intune SDK or wrapped by the Intune App Wrapping Tool. For more information see [Microsoft Intune App SDK Overview](../developer/app-sdk.md) and [Prepare line-of-business apps for app protection policies](../developer/apps-prepare-mobile-application-management.md).
98
94
99
-
6. Click **Next** to display the **Data protection** page. This page provides settings for data loss prevention (DLP) controls, including cut, copy, paste, and save-as restrictions. These settings determine how users interact with data in the apps that this app protection policy applies.
95
+
6. Click **Next** to display the **Data protection** page. \
96
+
This page provides settings for data loss prevention (DLP) controls, including cut, copy, paste, and save-as restrictions. These settings determine how users interact with data in the apps that this app protection policy applies.
100
97
101
-
**Data protection settings**
102
-
-**iOS/iPadOS data protection** - For information, see [iOS/iPadOS app protection policy settings - Data protection](app-protection-policy-settings-ios.md#data-protection).
103
-
-**Android data protection** - For information, see [Android app protection policy settings - Data protection](app-protection-policy-settings-android.md#data-protection).
98
+
**Data protection settings**:
99
+
-**iOS/iPadOS data protection** - For information, see [iOS/iPadOS app protection policy settings - Data protection](app-protection-policy-settings-ios.md#data-protection).
100
+
-**Android data protection** - For information, see [Android app protection policy settings - Data protection](app-protection-policy-settings-android.md#data-protection).
104
101
105
-
7. Click **Next** to display the **Access requirements** page. This page provides settings to allow you to configure the PIN and credential requirements that users must meet to access apps in a work context.
102
+
7. Click **Next** to display the **Access requirements** page. \
103
+
This page provides settings to allow you to configure the PIN and credential requirements that users must meet to access apps in a work context.
106
104
107
-
**Access requirements settings**
108
-
-**iOS/iPadOS access requirements** - For information, see [iOS/iPadOS app protection policy settings - Access requirements](app-protection-policy-settings-ios.md#access-requirements).
109
-
-**Android access requirements** - For information, see [Android app protection policy settings - Access requirements](app-protection-policy-settings-android.md#access-requirements).
105
+
**Access requirements settings**:
106
+
-**iOS/iPadOS access requirements** - For information, see [iOS/iPadOS app protection policy settings - Access requirements](app-protection-policy-settings-ios.md#access-requirements).
107
+
-**Android access requirements** - For information, see [Android app protection policy settings - Access requirements](app-protection-policy-settings-android.md#access-requirements).
110
108
111
-
8. Click **Next** to display the **Conditional launch** page. This page provides settings to set the sign-in security requirements for your app protection policy.
109
+
8. Click **Next** to display the **Conditional launch** page. \
110
+
This page provides settings to set the sign-in security requirements for your app protection policy. Select a **Setting** and enter the **Value** that users must meet to sign in to your company app. Then select the **Action** you want to take if users do not meet your requirements. In some cases, multiple actions can be configured for a single setting.
112
111
113
-
9. Select a **Setting** and enter the **Value** that users must meet to sign in to your company app. Then select the **Action** you want to take if users do not meet your requirements. In some cases, multiple actions can be configured for a single setting.
112
+
**Conditional launch settings**:
113
+
-**iOS/iPadOS conditional launch** - For information, see [iOS/iPadOS app protection policy settings - Conditional launch](app-protection-policy-settings-ios.md#conditional-launch).
114
+
-**Android conditional launch** - For information, see [Android app protection policy settings - Conditional launch](app-protection-policy-settings-android.md#conditional-launch).
114
115
115
-
**Conditional launch settings**
116
-
-**iOS/iPadOS conditional launch** - For information, see [iOS/iPadOS app protection policy settings - Conditional launch](app-protection-policy-settings-ios.md#conditional-launch).
117
-
-**Android conditional launch** - For information, see [Android app protection policy settings - Conditional launch](app-protection-policy-settings-android.md#conditional-launch).
116
+
9. Click **Next** to display the **Assignments** page. \
117
+
The **Assignments** page allows you to assign the app protection policy to groups of users. You must apply the policy to a group of users to have the policy take effect.
118
118
119
-
10. Click **Next** to display the **Assignments** page. The **Assignments** page allows you to assign the app protection policy to groups of users. **You must apply the policy to a group of users to have the policy take effect.**
119
+
10. Click **Next: Review + create** to review the values and settings you entered for this app protection policy.
120
120
121
-
11. Click **Next: Review + create** to review the values and settings you entered for this app protection policy.
122
-
123
-
12. When you are done, click **Create** to create the app protection policy in Intune.
121
+
11. When you are done, click **Create** to create the app protection policy in Intune.
124
122
125
123
> [!TIP]
126
124
> These policy settings are enforced only when using apps in the work context. When end users use the app to do a personal task, they aren't affected by these policies. Note that when you create a new file it is considered a personal file.
@@ -129,11 +127,13 @@ When you create an app protection policy for iOS/iPadOS and Android apps, you fo
129
127
> It can take time for app protection policies to apply to existing devices. End users will see a notification on the device when the app protection policy is applied. Apply your app protection policies to devices before applying condidtional access rules.
130
128
131
129
End users can download the apps from the App store or Google Play. For more information, see:
132
-
-[Managed work and school apps for Android](../user-help/use-managed-apps-on-your-device-android.md)
133
-
-[What to expect when your iOS/iPadOS app is managed by app protection policies](../fundamentals/end-user-mam-apps-ios.md)
130
+
*[Managed work and school apps for Android](../user-help/use-managed-apps-on-your-device-android.md)
131
+
*[What to expect when your iOS/iPadOS app is managed by app protection policies](../fundamentals/end-user-mam-apps-ios.md)
134
132
135
133
## Change existing policies
136
-
You can edit an existing policy and apply it to the targeted users. However, when you change existing policies, users who are already signed in to the apps won't see the changes for an eight-hour period. To see the effect of the changes immediately, the end user must sign out of the app, and then sign back in.
134
+
You can edit an existing policy and apply it to the targeted users. However, when you change existing policies, users who are already signed in to the apps won't see the changes for an eight-hour period.
135
+
136
+
To see the effect of the changes immediately, the end user must sign out of the app, and then sign back in.
137
137
138
138
### To change the list of apps associated with the policy
139
139
@@ -146,11 +146,11 @@ You can edit an existing policy and apply it to the targeted users. However, whe
146
146
4. The **Apps** page allows you to choose how you want to apply this policy to apps on different devices. You must add at least one app.
|Target to apps on all devices types |Use this option to target your policy to apps on devices of any management state. Choose **No** to target apps on specific devices types. Additional app configuration may be required for this setting. For more information, see [Target app protection policies based on device management state](#target-app-protection-policies-based-on-device-management-state). |
151
-
|Device types |Use this option to specify whether this policy applies to MDM managed devices or unmanaged devices. For iOS/iPadOS APP policies, select from **Unmanaged** and **Managed** devices. For Android APP policies, select from **Unmanaged**, **Android device administrator**, and **Android Enterprise**. |
152
-
|Public apps |In the **Target policy to** dropdown box, choose to target your app protection policy to **All public apps**, **Microsoft Apps**, or **Core Microsoft Apps**. Next, you can select **View a list of the apps that will be targeted** to view a list of the apps that will be affected by this policy.<p>If needed, you can choose to target individual apps by clicking **Select public apps**. |
153
-
|Custom apps |Click **Select custom apps** to select custom apps to target based on a Bundle ID. |
|Target to apps on all devices types |Use this option to target your policy to apps on devices of any management state. Choose **No** to target apps on specific devices types. Additional app configuration may be required for this setting. For more information, see [Target app protection policies based on device management state](#target-app-protection-policies-based-on-device-management-state). |
151
+
|Device types |Use this option to specify whether this policy applies to MDM managed devices or unmanaged devices. For iOS/iPadOS APP policies, select from **Unmanaged** and **Managed** devices. For Android APP policies, select from **Unmanaged**, **Android device administrator**, and **Android Enterprise**. |
152
+
|Public apps |In the **Target policy to** dropdown box, choose to target your app protection policy to **All public apps**, **Microsoft Apps**, or **Core Microsoft Apps**. Next, you can select **View a list of the apps that will be targeted** to view a list of the apps that will be affected by this policy.<p>If needed, you can choose to target individual apps by clicking **Select public apps**. </p>|
153
+
|Custom apps |Click **Select custom apps** to select custom apps to target based on a Bundle ID. |
154
154
155
155
The app(s) you have selected will appear in the public and custom apps list.
156
156
@@ -184,9 +184,9 @@ You can edit an existing policy and apply it to the targeted users. However, whe
184
184
185
185
3. Next to the section corresponding to the settings you want to change, select **Edit**. Then change the settings to new values.
186
186
187
-
4. Click **Review + create** to review the updated settings for this policy.
187
+
5. Click **Review + create** to review the updated settings for this policy.
188
188
189
-
5. Select the **Save** to save your changes. Repeat the process to select a settings area and modify and then save your changes, until all your changes are complete. You can then close the *Intune App Protection - Properties* pane.
189
+
6. Select the **Save** to save your changes. Repeat the process to select a settings area and modify and then save your changes, until all your changes are complete. You can then close the *Intune App Protection - Properties* pane.
190
190
191
191
## Target app protection policies based on device management state
192
192
In many organizations, it's common to allow end users to use both Intune Mobile Device Management (MDM) managed devices, such as corporate owned devices, and un-managed devices protected with only Intune app protection policies. Unmanaged devices are often known as Bring Your Own Devices (BYOD).
@@ -202,13 +202,13 @@ To create these policies, browse to **Apps** > **App protection policies** in th
202
202
-**Android device administrator**: Intune-managed devices using the Android Device Administration API.
203
203
-**Android Enterprise**: Intune-managed devices using Android Enterprise Work Profiles or Android Enterprise Full Device Management.
204
204
205
-
Android devices will prompt to install the Intune Company Portal app regardless of which Device type is chosen. For example, if you select 'Android Enterprise' then users with unmanaged Android devices will still be prompted.
205
+
On Android, Android devices will prompt to install the Intune Company Portal app regardless of which Device type is chosen. For example, if you select 'Android Enterprise' then users with unmanaged Android devices will still be prompted.
206
206
207
207
For iOS/iPadOS, for the 'Device type' selection to be enforced to Intune managed devices, additional app configuration settings are required. These configurations will communicate to the APP service that a particular app is managed—and that APP settings will not apply:
208
208
209
209
-**IntuneMAMUPN** must be configured for all MDM managed applications. For more information, see [How to manage data transfer between iOS/iPadOS apps in Microsoft Intune](data-transfer-between-apps-manage-ios.md#configure-user-upn-setting-for-microsoft-intune-or-third-party-emm).
210
210
-**IntuneMAMDeviceID** must be configured for all third-party and line-of-business MDM managed applications. The **IntuneMAMDeviceID** should be configured to the device ID token. For example, `key=IntuneMAMDeviceID, value={{deviceID}}`. For more information, see [Add app configuration policies for managed iOS/iPadOS devices](app-configuration-policies-use-ios.md).
211
-
- If only the **IntuneMAMDeviceID** is configured, the Intune app will consider the device as unmanaged.
211
+
- If only the **IntuneMAMDeviceID** is configured, the Intune APP will consider the device as unmanaged.
212
212
213
213
> [!NOTE]
214
214
> For specific iOS/iPadOS support information about app protection policies based on device management state, see [MAM protection policies targeted based on management state](../fundamentals/whats-new-archive.md#mam-protection-policies-targeted-based-on-management-state).
0 commit comments