Skip to content

Commit 8885073

Browse files
Merge pull request #27943 from MicrosoftDocs/zt-freshness-manage-endpoints-with-intune
Zero Trust - freshness/accuracy udpates for Manage endpoints with Intune Guide
2 parents abaa668 + e32650e commit 8885073

8 files changed

Lines changed: 96 additions & 97 deletions

microsoft-365/solutions/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ items:
3535
items:
3636
- name: Overview
3737
href: manage-devices-with-intune-overview.md
38-
- name: Step 1. Implement App Protection policies
38+
- name: Step 1. Implement app protection policies
3939
href: manage-devices-with-intune-app-protection.md
4040
- name: Step 2. Enroll devices into management
4141
href: manage-devices-with-intune-enroll.md

microsoft-365/solutions/manage-devices-with-intune-app-protection.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ f1.keywords:
99
- MAM
1010
- set up mobile ap protection
1111
manager: dougeby
12-
ms.date: 04/17/2024
12+
ms.date: 03/14/2025
1313
audience: ITPro
1414
ms.topic: how-to
1515
description: Configure mobile app protection with App Protection policies (APP) to prevent specified corporate data from being copied and pasted to other apps.
@@ -25,27 +25,27 @@ ms.custom:
2525
keywords:
2626
---
2727

28-
# Step 1. Implement App Protection Policies
28+
# Step 1. Implement app protection policies
2929

30-
Intune App Protection Policies (APP), sometimes referred to as Mobile Application Management (MAM), protect corporate data even if a device itself is not managed. This allows you to enable bring-your-own (BYO) and personal devices at work where users may be reluctant to enroll their device into management. APP ensure corporate data in the apps you specify cannot be copied and pasted to other apps on the device.
30+
Microsoft Intune app protection policies, sometimes referred to as Mobile Application Management (MAM), protect corporate data even if a device itself is not managed. This allows you to enable bring-your-own (BYO) and personal devices at work where users might be reluctant to "enroll" their device into management. App protection policies ensure corporate data in the apps you specify can't be copied and pasted to other apps on the device.
3131

3232
:::image type="content" source="../media/devices/intune-app-steps.png" alt-text="Steps for creating App Protection Policies to separate organization and personal data on a device." lightbox="../media/devices/intune-app-steps.png":::
3333

3434
In this illustration:
3535

36-
- With APP, Intune creates a wall between your organization data and personal data. The app protection policies define which apps are allowed to access your data.
36+
- With app protection policies, Intune creates a wall between your organization data and personal data. The app protection policies define which apps are allowed to access your data.
3737
- If a user signs in with their organization credentials, Intune applies a policy at the app layer to prevent copy and paste of your organization data to personal apps and to require PIN access to this data.
38-
- After creating an App Protection policy, you enforce data protection with a Conditional Access policy.
38+
- After creating an app protection policy, you enforce data protection with a Conditional Access policy.
3939

40-
This configuration greatly increases your security posture with almost no impact to the user experience. Employees can use apps like Office and Microsoft Teams, that they know and love, while at the same time your organization can protect the data contained within the apps and devices.
40+
This configuration greatly increases your security posture with almost no impact on the user experience. Employees can use apps like Microsoft Office and Microsoft Teams, that they know and love, while at the same time your organization can protect the data contained within the apps and devices.
4141

42-
If you have custom Line of Business applications that need protection, currently you can use the app wrapping tool to enable APP with these applications. Or, you can integrate using the Intune App SDK. When your app has app protection policies applied to it, it can be managed by Intune and is recognized by Intune as a managed app.
42+
If you have custom line-of-business applications that need protection, currently you can use the app wrapping tool to support using app protection policies with these applications. Or, you can integrate using the Intune App SDK. When your app has app protection policies applied to it, it can be managed by Intune and is recognized by Intune as a managed app.
4343

44-
For more information about protecting your Line of Business applications using Intune, see [Prepare apps for mobile application management with Microsoft Intune](/mem/intune/developer/apps-prepare-mobile-application-management).
44+
For more information about protecting your line-of-business applications using Intune, see [Prepare apps for mobile application management with Microsoft Intune](/mem/intune-service/developer/apps-prepare-mobile-application-management).
4545

4646
## Configuring mobile app protection
4747

48-
This guidance is tightly coordinated with the recommended [Zero Trust identity and device access policies](../security/office-365-security/zero-trust-identity-device-access-policies-overview.md). After you create the Mobile App protection policies in Intune, work with your identity team to configure the Conditional Access policies in Microsoft Entra ID that enforce mobile app protection.
48+
This guidance is tightly coordinated with the recommended [Zero Trust identity and device access policies](../security/office-365-security/zero-trust-identity-device-access-policies-overview.md). After you create the mobile app protection policies in Intune, work with your identity team to configure the Conditional Access policies in Microsoft Entra ID that enforce mobile app protection.
4949

5050
This illustration highlights the two policies (also described in the table following the illustration).
5151

@@ -55,7 +55,7 @@ To configure these policies, use the recommended guidance and settings prescribe
5555

5656
|Policy |More information |Licensing |
5757
|---------|---------|---------|
58-
| [Apply Application Protection Policies (APP) data protection](../security/office-365-security/zero-trust-identity-device-access-policies-common.md#app-protection-policies) | One Intune App Protection policy per platform (Windows, iOS/iPadOS, Android). | Microsoft 365 E3 or E5 |
58+
| [Apply application protection policies for data protection](../security/office-365-security/zero-trust-identity-device-access-policies-common.md#app-protection-policies) | One Intune App Protection policy per platform (Windows, iOS/iPadOS, Android). | Microsoft 365 E3 or E5 |
5959
| [Require approved apps and app protection](../security/office-365-security/zero-trust-identity-device-access-policies-common.md#require-approved-apps-and-app-protection-policies) | Enforces mobile app protection for phones and tablets using iOS, iPadOS, or Android. | Microsoft 365 E3 or E5 |
6060

6161
## Next step

microsoft-365/solutions/manage-devices-with-intune-compliance-policies.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ f1.keywords:
66
- Create compliance policies
77
- Intune device compliance policy
88
manager: dougeby
9-
ms.date: 04/17/2024
9+
ms.date: 03/14/2025
1010
audience: ITPro
1111
description: Learn how to create device compliance policies that specify the minimum requirements for a device to access your environment.
1212
ms.topic: how-to
@@ -24,11 +24,11 @@ keywords:
2424

2525
# Step 3. Set up compliance policies for devices with Intune
2626

27-
Enrolling devices to Intune gives you the ability to achieve even greater security and control of data in your environment. [Step 2. Enroll devices to Intune](manage-devices-with-intune-enroll.md) details how to accomplish this using Intune. This article covers the next step, which is to configure device compliance policies.
27+
Enrolling devices to Microsoft Intune gives you the ability to achieve even greater security and control of data in your environment. [Step 2. Enroll devices in Intune](manage-devices-with-intune-enroll.md) details how to accomplish this using Intune. This article covers the next step, which is to configure device compliance policies.
2828

2929
:::image type="content" source="../media/devices/intune-mdm-step-2.png" alt-text="The second step of Mobile Device Management to create compliance policies." lightbox="../media/devices/intune-mdm-step-2.png":::
3030

31-
You want to be sure devices that are accessing your apps and data meet minimum requirements. For example, they’re password or pin-protected and the operating system is up to date. Compliance policies are the way to define the requirements that devices must meet. Intune uses these compliance policies to mark a device as compliant or non-compliant. This binary status is passed to Microsoft Entra which can use this status in Conditional Access rules to allow or prevent a device from accessing resources.
31+
You want to be sure devices that access your apps and data meet minimum requirements. For example, that they’re password or PIN-protected and the operating system is up to date. Compliance policies are the way to define the requirements that devices must meet. Intune uses these compliance policies to mark a device as compliant or non-compliant. This binary status is passed to Microsoft Entra which can use this status in Conditional Access rules to allow or prevent a device from accessing resources.
3232

3333
## Configuring device compliance policies
3434

@@ -38,7 +38,7 @@ This illustration highlights where the work of defining compliance policies fits
3838

3939
:::image type="content" source="../media/devices/identity-device-define-compliance.svg" alt-text="Highlighted Zero Trust identity and device access policies for Intune device compliance." lightbox="../media/devices/identity-device-define-compliance.svg":::
4040

41-
In this illustration, defining device compliance policies is a dependency for achieving the recommended level of protection within the Zero Trust framework.
41+
In this illustration, defining device compliance policies is a dependency for achieving the recommended level of protection within the Zero Trust framework.
4242

4343
To configure device compliance policies, use the recommended guidance and settings prescribed in [Zero Trust identity and device access policies](../security/office-365-security/zero-trust-identity-device-access-policies-overview.md). The following table links directly to the instructions for configuring these policies in Intune, including the recommended settings for each platform.
4444

0 commit comments

Comments
 (0)