Close Menu
Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Facebook X (Twitter) Instagram
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    • Home
    • Intune
    • Windows
      • Modern Workplace
    • macOS
    • Android
    • iOS
    • Automation
      • Logic Apps
      • Intune Monitoring
      • GitHub
    • Security
      • Passwordless
      • Security
    • Speaking
    • About me
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Home»Android»Force Outlook on iOS and Android to access the Exchange Online mailbox
    Android

    Force Outlook on iOS and Android to access the Exchange Online mailbox

    Peter KlapwijkBy Peter KlapwijkMarch 29, 2019Updated:March 18, 2020323 Mins Read

    Today I`m writing a post about how to force your users to use the Outlook app on iOS and Android devices to access the Exchange Online mailbox, even when using a personal non-managed device. A reason for this requirement of forcing your users to use the Outlook app is the use of multi-factor authentication (MFA) on your users mailboxes. Some third-party mail applications still try to connect to your users mailbox using legacy protocols and therefore are bypassing MFA. Another reason is when you are using an App Protection Policy (APP) to protect company data received via email. Only on applications which integrate with the Intune SDK are those APP settings applied.

    To set this up, we will use an Azure Conditional Access policy to allow access to Exchange Online on iOS or Android only by using an approved app (Microsoft Outlook). So we are sure MFA is enforced, even as the App Protection Policy.

    Setup the Azure Conditional Access policy

    1. Open the Device Management portal and click Conditional Access
    2. On the Policies tab click New policy

    1. Give the new CA Policy a Name
    2. Under Assignments click the tab Users and Groups
    3. Select to which group of users you will apply the policy to (start with a pilot group)
    4. click Done

    1. Click Cloud apps – select apps and search for Exchange Online (take note of the message which is shown!)
    2. Click Done

    1. Select Conditions – Device platforms
    2. Click Yes
    3. Select Android and iOS
    4. Click Done

    • Click Client apps (still under Conditions)
    • Click Yes
    • Select Browser, Mobile apps and desktop clients, Exchange Active Sync clients and other clients
    • Click Done

    Take note of the message which is shown about selecting Exchange Active Sync (EAS). When selecting EAS, not all other conditions are supported in the same CA Policy, for example MFA. If you want to use one of those conditions, you have to uncheck EAS and setup a second CA policy.

    If you want to exclude devices which are marked as compliant in Intune from this policy, on the Device state tab you can achieve this by selecting Device marked as compliant.

    1. Click Grant (under Access Control)
    2. Select Grant Access
    3. Select Require approved client app
    4. Click Select
    5. Click On under Enable Policy
    6. Click Create

    What we have achieved by setting up this Conditional Access policy looks like this in an overview. User Jane is targeted with the CA policy and she is using her iOS device. When see uses Outlook (which is an approved client) to access her Exchange Online mailbox, access is allowed. When see uses another app to access her mailbox, access is blocked.

    End-user experience

    When a user, which is targeted with the CA policy, for example setups the Gmail app to access the mailbox the user receives a message like below
    You can`t get there from here

    When the Outlook app is downloaded en the user signs-in to Outlook, the user is presented aother message. A broker app is needed to move on. On Android the Company portal app is used as broker app and on iOS the Microsoft Authenticator app is used. When the user clicks on Get the app, the user is redirected to the app store to download the broker app.

    When the broker app is downloaded, click on Open or just switch to Outlook. After providing the sign-in credentials again, the devices needs the be registered.

    When registration of the device is finished, the Inbox is opened!

    The next step in securing access to company data in the users mailbox would be setting up an App Protection Policy, which I will show in the next blog post.

    Android Conditional Access EMS Exchange Online Intune iOS MEM Microsoft 365 Microsoft Endpoint Manager Office 365 Outlook Security
    Share. Facebook Twitter LinkedIn Email WhatsApp
    Peter Klapwijk
    • Website
    • X (Twitter)
    • LinkedIn

    Peter is a Security (Intune) MVP since 2020 and is working as Modern Workplace Engineer at Wortell in The Netherlands. He has more than 15 years of experience in IT, with a strong focus on Microsoft technologies like Microsoft Intune, Windows, and (low-code) automation.

    Related Posts

    Secure Outlook Mobile with App Protection Policies

    April 3, 2019

    Intune – Enrollment Status Page

    May 18, 2018

    Conditional Access in the new Azure portal

    December 22, 2016
    View 32 Comments

    32 Comments

    1. Tyler on October 30, 2019 14:03

      Hey Peter,

      We recently made the switch company wide to force all employees to use the Outlook app for iOS. We used the Microsoft authenticator app. It was a very seamless transition with no negative effects. Everything very simple, no downtime, no errors, nobody even needed IT’s help. I’ll continue to provide updates here regarding any issues or feedback. By the way, did you wind up writing the post on App protection policy? I didn’t see it on the site.

      Thanks

      Reply
      • Peter Klapwijk on October 30, 2019 20:25

        HI Tyler,
        I wrote this article on App protection policy/ Outlook mobile https://inthecloud247.com/secure-outlook-mobile-with-app-protection-policies/

        I linked in in the article now.

        Reply
    2. John on February 19, 2020 17:42

      Great article. I’m trying to stop users enrolling their BYOD devices but force them to use the Outlook app. I have blocked personal devices in the Enrollment Restrictions but now they cannot enrol/use Outlook for new users?

      Reply
      • Peter Klapwijk on February 19, 2020 18:02

        When you block Personally owned devices in the Enrollment restrictions, you need to register your corporate owned devices. You can find this under Devices, Enroll Devices, Corporate device identifiers.
        Or you could use Apple Business Manager (previously DEP) for iOS and Samsung Knox Mobile Enrollment for Samsung devices.

        Reply
        • Dez on October 23, 2020 21:47

          one query about this when blocking personal owned devices from enrolling in Android (So they can only use app protection), if you company android enrol devices the fully managed way where the user scans the QR dopes this class it as corporate without having to add it via Samsung Knox? Just we have devices that cant be added to Knox as we already have them.

          Reply
          • Peter Klapwijk on October 24, 2020 08:41

            That`s a good one, not tried that yet.

            Reply
    3. FJ on May 21, 2020 19:52

      Great article. I got this working on everything except on Samsung eMail native app have you encountered this issue?

      Reply
      • Peter Klapwijk on May 22, 2020 13:27

        What are you trying to accomplish? Is the Samsung email native app not blocked?

        Reply
    4. Ase on July 19, 2020 12:29

      Hi,
      How do I force Outlook for all our managed IOS devices?

      As

      Reply
      • Peter Klapwijk on July 20, 2020 14:49

        Hi Ase,

        Have a look at this article https://inthecloud247.com/azure-ad-conditional-access-explained-android-and-ios

        You should set in the CA policy at Access control that an approved app is required to access Exchange Online. That would block the native iOS mail app to access Exchange Online.

        Regards,

        Peter

        Reply
    5. Aussupport on July 23, 2020 12:21

      “the user receives a message like below You can`t get there from here”

      Where do i configure that template you have shown here?

      Reply
    6. Aussupport on July 23, 2020 13:03

      Hi Peter,
      What will happen to current native mail client?
      As

      Reply
      • Peter Klapwijk on July 27, 2020 20:09

        The You can`t get there from here screen is from a Android device, which differs from iOS. There is no template used or something to configure on that.

        The native mail client will be blocked from accessing corporate mail if everything is configured to only allow approved apps.

        Reply
    7. Intunetester on August 2, 2020 06:14

      Great article.

      With a BYOD Intune enrolled Android device, is there a way to block a user from accessing corp email in personal Outlook (personal profile) but still able to access corp email in Outlook from work profile? Thanks.

      Reply
      • Peter Klapwijk on August 3, 2020 13:32

        When you enroll the device with Android Work Profile this can be done with a Conditional Access policy. Require a compliant device will make sure the user cannot access the mail in the personal part of the device, but only in the Work profile.
        When the user tries to access mail with Outlook in the personal part of the device, a message is shown to enroll/ register the device, which fails.
        Have a look at this article for some information related to Android and CA policies https://inthecloud247.com/azure-ad-conditional-access-explained-android-and-ios

        Reply
        • Intunetester on August 3, 2020 18:53

          Thanks for the reply.

          When the user tries to create Work account in Personal Outlook, he is asked to enroll the device and then the whole process is back to square 1 (remove badge, enroll device, install Outlook in Work profile, then user wonders why Personal Outlook is still not done). Even the log doesn’t show what the user was trying to do to have a clearer picture on what happened to the user and what guideline and troubleshooting steps need to be performed from Admin’s perspective. Is this also your experience?

          Reply
          • Peter Klapwijk on August 15, 2020 11:18

            When the user tries to access mail with Outlook in the personal part of the device, a message is shown to enroll/ register the device. The user is asked to install the Company Portal app, which is already installed, so only needs to be activated. When opening the CP app, the user sees a message he`s half-way and need to open the CP app with the work badge icon.

            Reply
            • andrzej on September 9, 2021 17:50

              In my experience it seems to working.. l tried:
              1. User tries to log in using Outlook App in Personal part.
              2. Outlook says that user has to install Intune App from Google Play
              3. User installs Intune App
              4. User run again Outlook in personal part, provides a password then Outlook is asking for register device
              5. User click “register” and device is trying to register but without success, it asks for install Microsoft Intune Portal. This point lasts over and over again.

              I have CA configured for this user with:
              Require device to be marked as compliant
              Require approved client app
              Require app protection policy
              Require all the selected controls

    8. Marc on October 13, 2020 22:01

      Ridiculous that Microsoft makes it possible to force end users to only use their clients. You can bet that in a while those MS apps will only run on their own OS.
      Abuse of market power. A am amazed that no-one is suprised this is even allowed by anti-trust organizations

      Reply
      • Demir on August 14, 2022 00:12

        Absolutely agree. I hate using outlook app on my iPhone. It works so bad and doesn’t separate thread properly as ios mail.

        Reply
    9. wh1t3rbt on October 20, 2020 09:09

      I have an android device enrolled with a work profile. I currently have outlook installed in both the personal profile and also in the work profile downloaded from the company store as an approved app. Is there a way to only restrict access to email via the outlook in the work profile? I need to block users setting up a company email profile from the personal profile.

      Reply
      • Peter Klapwijk on October 24, 2020 08:39

        This should be accomplished by using a Conditional Access policy where the requirement is that only a Compliant Device is allowed to access corp data.
        Have a look at this post https://inthecloud247.com/azure-ad-conditional-access-explained-android-and-ios/

        Reply
    10. Tim Madel on November 9, 2020 19:07

      Doing this basically limits the capabilities your phone and watch (if you have one). Not being able to use third party apps for calendaring etc is beyond stupid. Why not just set up the two factor authentication when adding the account in iOS or Android settings?

      Reply
    11. Mustafa on December 2, 2020 13:32

      Thank you very much for the article. Its really helpful. Some users are receiving email after the policy is applied. Some users are not. Under what condition(s) do users receive notification email? Is there a configuration for that? Title of the email is “access your organization’s email with outlook email” btw

      Reply
    12. Jim on January 22, 2021 21:22

      This seems to work except that it is requiring a certificate on the BYOD device, which I don’t want to require. Is there a way around this?

      Reply
      • Peter Klapwijk on January 28, 2021 10:40

        It needs a broker app to assign the policies/ restrictions, no way around this.

        Reply
    13. Ivan Dretvic on May 19, 2021 09:57

      Thanks for the article. I wanted clarity on one point. Whats the advantage of EXCLUDING a compliant device vs GRANTING compliant device as one of the policies?
      At face value it feels like the effect is the same.

      Reply
      • Peter Klapwijk on June 15, 2021 20:56

        That depends on the use case.
        You might for example require MFA for an application and every device, except on compliant devices.

        Reply
    14. Saurabh Chhabra on June 10, 2021 14:42

      Thanks for the article. Policy worked perfectly for new logins.
      But for the users who were already using native app before policy deployment , they are still able to access mail. How can we block existing native app users.

      Reply
      • Peter Klapwijk on June 15, 2021 20:52

        Existing users would most likely get blocked when the access token lifetime is expired.

        Reply
    15. Abram Kaufman on June 13, 2022 21:18

      If users were already enrolled before pushing out this policy it is my understanding that new Work eMails will not load in the native mail app, but old eMails will still be available. Is there any option from Intune to remove the account and old eMails from enrolled devices to force a cleanup?

      Reply
    16. xCONFLiCTiONx on June 23, 2022 15:32

      Thank you very much for making this tutorial! When I was unable to connect to Exchange with my Android I though I’d broken something and was paranoid. I figured it must be some permission so I searched and came across your tutorial and it worked flawlessly. I am moving tomorrow and don’t need a huge burden of trying to figure out the beast of Microsoft 365 and all there policies right now. Lol

      Reply
    Leave A Reply Cancel Reply

    Peter Klapwijk

    Hi! Welcome to my blog post.
    I hope you enjoy reading my articles.

    Hit the About Me button to get in contact with me or leave a comment.

    Awards
    Sponsor
    Latest Posts

    Create deployment ring groups for Microsoft Intune

    June 27, 2025

    Update Windows Defender during Windows Autopilot enrollments

    May 16, 2025

    Hide the “Turn on an ad privacy feature” pop-up in Chrome with Microsoft Intune

    April 19, 2025

    How to set Google as default search provider with Microsoft Intune

    April 18, 2025
    follow me
    • Twitter 4.8K
    • LinkedIn 6.1K
    • YouTube
    • Bluesky 1.5K
    Tags
    Administrative Templates Android Automation Autopilot Azure Azure AD Browser Conditional Access Edge EMS Exchange Online Feitian FIDO2 Flow Google Chrome Graph Graph API Identity Management Intune Intune Monitoring iOS KIOSK Logic Apps macOS MEM MEMMonitoring Microsoft 365 Microsoft Edge Microsoft Endpoint Manager Modern Workplace Office 365 OneDrive for Business Outlook Passwordless PowerApps Power Automate Security SharePoint Online Teams Windows Windows 10 Windows10 Windows 11 Windows Autopilot Windows Update
    Copy right

    This information is provided “AS IS” with no warranties, confers no rights and is not supported by the authors, or In The Cloud 24-7.

     

    Copyright © 2025 by In The Cloud 24-7/ Peter Klapwijk. All rights reserved, No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

    Shorthand; Don’t pass off my work as yours, it’s not nice.

    Recent Comments
    • Parth Savjadiya on Using Visual Studio with Microsoft Endpoint Privilege Management, some notes
    • Chris Johnson on Assign Deny Local Log On user right to an (Azure) AD group by using Microsoft Intune
    • Northernsky on Automatically wipe a Windows 10 device after a number of authentication failures
    • Henrik on Intune Driver update for Windows – Get applicable devices
    • Adam on Get notified on expiring Azure App Registration client secrets
    most popular

    Application installation issues; Download pending

    October 1, 2024

    Restrict which users can logon into a Windows 10 device with Microsoft Intune

    April 11, 2020

    How to change the Windows 11 language with Intune

    November 11, 2022

    Update Microsoft Edge during Windows Autopilot enrollments

    July 9, 2024
    Peter Klapwijk – In The Cloud 24-7
    X (Twitter) LinkedIn YouTube RSS Bluesky
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    Manage Cookie Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
    View preferences
    {title} {title} {title}