New App Protection capabilities added to Microsoft Intune

The App Protection Policies in Microsoft Intune are used to protect corporate data in apps that have the Intune SDK integrated. During the last service update of Microsoft Intune some nice new features were added to the policy set.

While accessing a by Microsoft Intune managed app, the device can be checked if for instance a device is rooted or jailbroken, or what kind of OS version is on the device while launching the app on the device, based on the results we are now able to add an action, sometimes multiple actions. So you are able to based on a setting, block access, warn the user or wipe the company data in the app.

Lets see how this looks like.

New App Protection capabilities on iOS

Below you find an overview of the checks and (automatic) actions for App Protection policies on iOS;

 

Setting Action
Max PIN Attempts Reset PIN
Wipe data
Offline grace period Block access
Wipe data
Jailbroken / rooted devices Block access
Wipe data
Min OS version Block access
Wipe data
Warn
Min App version Block access
Wipe data
Warn
Min SDK version Block access
Wipe data
Device Model(s) Allow specific (block non-specific)
Allow specific (wipe non-specific)

 

When a device is “not compliant” with one of the settings, the action will be performed instantly. So for instance a user jailbreaks the device, the corporate data is automatically wiped.

During the service update we also have now the ability to check what model of device is being used to access the corporate data. In the example below, I only allow iPhone 8 and iPhone X devices to access our corporate email. See a complete list of models that can be used via this link.

The end user experience looks like below. The user is not able to access their email and can remove the account or contact their administrator.

New App Protection capabilities on Android

On Android there are also additions, below you find an overview of the checks and (automatic) actions for App Protection policies on Android;

Setting Action
Max PIN Attempts Reset PIN
Wipe data
Offline grace period Block access
Wipe data
Jailbroken / rooted devices Block access
Wipe data
Min OS version Block access
Wipe data
Warn
Min App version Block access
Wipe data
Warn
Min patch  version Block access
Wipe data
Device Manufactures(s) Allow specific (block non-specific)
Allow specific (wipe non-specific)

 

New to the Android App Protection policy is that we now can “whitelist” device manufactures of devices that can be used to access the corporate data via the Intune managed apps.

In the example below, I only allow devices manufactured by Huawei to access our corporate email. (don’t ask me why ???? ). In this case the data should be wiped instantly.

The end user experience looks like below. The user is not able to access their email and can remove the account or contact their administrator.

Another great example of the innovation that is constantly added to Microsoft Intune.

Till next time!

Comments

Total
0
Shares
1 comment
  1. I used the minimum OS version attribute for some public apps like Microsoft Outlook but the app protection policy doesnot kick in. I deployed this policy to a user group which I am part of.

Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Post

Global- , Exchange-, SharePoint-, Conditional Access Admins -> action required!

Next Post

RBAC in Azure AD, Intune and scope tags explained

Related Posts
Total
0
Share