You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: microsoft-365/solutions/manage-devices-with-intune-app-protection.md
+10-10Lines changed: 10 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ f1.keywords:
9
9
- MAM
10
10
- set up mobile ap protection
11
11
manager: dougeby
12
-
ms.date: 04/17/2024
12
+
ms.date: 03/14/2025
13
13
audience: ITPro
14
14
ms.topic: how-to
15
15
description: Configure mobile app protection with App Protection policies (APP) to prevent specified corporate data from being copied and pasted to other apps.
@@ -25,27 +25,27 @@ ms.custom:
25
25
keywords:
26
26
---
27
27
28
-
# Step 1. Implement App Protection Policies
28
+
# Step 1. Implement app protection policies
29
29
30
-
Intune App Protection Policies (APP), sometimes referred to as Mobile Application Management (MAM), protect corporate data even if a device itself is not managed. This allows you to enable bring-your-own (BYO) and personal devices at work where users may be reluctant to “enroll” their device into management. APP ensure corporate data in the apps you specify cannot be copied and pasted to other apps on the device.
30
+
Microsoft Intune app protection policies, sometimes referred to as Mobile Application Management (MAM), protect corporate data even if a device itself is not managed. This allows you to enable bring-your-own (BYO) and personal devices at work where users might be reluctant to "enroll" their device into management. App protection policies ensure corporate data in the apps you specify can't be copied and pasted to other apps on the device.
31
31
32
32
:::image type="content" source="../media/devices/intune-app-steps.png" alt-text="Steps for creating App Protection Policies to separate organization and personal data on a device." lightbox="../media/devices/intune-app-steps.png":::
33
33
34
34
In this illustration:
35
35
36
-
- With APP, Intune creates a wall between your organization data and personal data. The app protection policies define which apps are allowed to access your data.
36
+
- With app protection policies, Intune creates a wall between your organization data and personal data. The app protection policies define which apps are allowed to access your data.
37
37
- If a user signs in with their organization credentials, Intune applies a policy at the app layer to prevent copy and paste of your organization data to personal apps and to require PIN access to this data.
38
-
- After creating an App Protection policy, you enforce data protection with a Conditional Access policy.
38
+
- After creating an app protection policy, you enforce data protection with a Conditional Access policy.
39
39
40
-
This configuration greatly increases your security posture with almost no impact to the user experience. Employees can use apps like Office and Microsoft Teams, that they know and love, while at the same time your organization can protect the data contained within the apps and devices.
40
+
This configuration greatly increases your security posture with almost no impact on the user experience. Employees can use apps like Microsoft Office and Microsoft Teams, that they know and love, while at the same time your organization can protect the data contained within the apps and devices.
41
41
42
-
If you have custom Line of Business applications that need protection, currently you can use the app wrapping tool to enable APP with these applications. Or, you can integrate using the Intune App SDK. When your app has app protection policies applied to it, it can be managed by Intune and is recognized by Intune as a managed app.
42
+
If you have custom line-of-business applications that need protection, currently you can use the app wrapping tool to support using app protection policies with these applications. Or, you can integrate using the Intune App SDK. When your app has app protection policies applied to it, it can be managed by Intune and is recognized by Intune as a managed app.
43
43
44
-
For more information about protecting your Line of Business applications using Intune, see [Prepare apps for mobile application management with Microsoft Intune](/mem/intune/developer/apps-prepare-mobile-application-management).
44
+
For more information about protecting your line-of-business applications using Intune, see [Prepare apps for mobile application management with Microsoft Intune](/mem/intune-service/developer/apps-prepare-mobile-application-management).
45
45
46
46
## Configuring mobile app protection
47
47
48
-
This guidance is tightly coordinated with the recommended [Zero Trust identity and device access policies](../security/office-365-security/zero-trust-identity-device-access-policies-overview.md). After you create the Mobile App protection policies in Intune, work with your identity team to configure the Conditional Access policies in Microsoft Entra ID that enforce mobile app protection.
48
+
This guidance is tightly coordinated with the recommended [Zero Trust identity and device access policies](../security/office-365-security/zero-trust-identity-device-access-policies-overview.md). After you create the mobile app protection policies in Intune, work with your identity team to configure the Conditional Access policies in Microsoft Entra ID that enforce mobile app protection.
49
49
50
50
This illustration highlights the two policies (also described in the table following the illustration).
51
51
@@ -55,7 +55,7 @@ To configure these policies, use the recommended guidance and settings prescribe
55
55
56
56
|Policy |More information |Licensing |
57
57
|---------|---------|---------|
58
-
|[Apply Application Protection Policies (APP) data protection](../security/office-365-security/zero-trust-identity-device-access-policies-common.md#app-protection-policies)| One Intune App Protection policy per platform (Windows, iOS/iPadOS, Android). | Microsoft 365 E3 or E5 |
58
+
|[Apply application protection policies for data protection](../security/office-365-security/zero-trust-identity-device-access-policies-common.md#app-protection-policies)| One Intune App Protection policy per platform (Windows, iOS/iPadOS, Android). | Microsoft 365 E3 or E5 |
59
59
|[Require approved apps and app protection](../security/office-365-security/zero-trust-identity-device-access-policies-common.md#require-approved-apps-and-app-protection-policies)| Enforces mobile app protection for phones and tablets using iOS, iPadOS, or Android. | Microsoft 365 E3 or E5 |
Copy file name to clipboardExpand all lines: microsoft-365/solutions/manage-devices-with-intune-compliance-policies.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ f1.keywords:
6
6
- Create compliance policies
7
7
- Intune device compliance policy
8
8
manager: dougeby
9
-
ms.date: 04/17/2024
9
+
ms.date: 03/14/2025
10
10
audience: ITPro
11
11
description: Learn how to create device compliance policies that specify the minimum requirements for a device to access your environment.
12
12
ms.topic: how-to
@@ -24,11 +24,11 @@ keywords:
24
24
25
25
# Step 3. Set up compliance policies for devices with Intune
26
26
27
-
Enrolling devices to Intune gives you the ability to achieve even greater security and control of data in your environment. [Step 2. Enroll devices to Intune](manage-devices-with-intune-enroll.md) details how to accomplish this using Intune. This article covers the next step, which is to configure device compliance policies.
27
+
Enrolling devices to Microsoft Intune gives you the ability to achieve even greater security and control of data in your environment. [Step 2. Enroll devices in Intune](manage-devices-with-intune-enroll.md) details how to accomplish this using Intune. This article covers the next step, which is to configure device compliance policies.
28
28
29
29
:::image type="content" source="../media/devices/intune-mdm-step-2.png" alt-text="The second step of Mobile Device Management to create compliance policies." lightbox="../media/devices/intune-mdm-step-2.png":::
30
30
31
-
You want to be sure devices that are accessing your apps and data meet minimum requirements. For example, they’re password or pin-protected and the operating system is up to date. Compliance policies are the way to define the requirements that devices must meet. Intune uses these compliance policies to mark a device as compliant or non-compliant. This binary status is passed to Microsoft Entra which can use this status in Conditional Access rules to allow or prevent a device from accessing resources.
31
+
You want to be sure devices that access your apps and data meet minimum requirements. For example, that they’re password or PIN-protected and the operating system is up to date. Compliance policies are the way to define the requirements that devices must meet. Intune uses these compliance policies to mark a device as compliant or non-compliant. This binary status is passed to Microsoft Entra which can use this status in Conditional Access rules to allow or prevent a device from accessing resources.
32
32
33
33
## Configuring device compliance policies
34
34
@@ -38,7 +38,7 @@ This illustration highlights where the work of defining compliance policies fits
38
38
39
39
:::image type="content" source="../media/devices/identity-device-define-compliance.svg" alt-text="Highlighted Zero Trust identity and device access policies for Intune device compliance." lightbox="../media/devices/identity-device-define-compliance.svg":::
40
40
41
-
In this illustration, defining device compliance policies is a dependency for achieving the recommended level of protection within the Zero Trust framework.
41
+
In this illustration, defining device compliance policies is a dependency for achieving the recommended level of protection within the Zero Trust framework.
42
42
43
43
To configure device compliance policies, use the recommended guidance and settings prescribed in [Zero Trust identity and device access policies](../security/office-365-security/zero-trust-identity-device-access-policies-overview.md). The following table links directly to the instructions for configuring these policies in Intune, including the recommended settings for each platform.
0 commit comments