Close Menu
Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Facebook X (Twitter) Instagram
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    • Home
    • Intune
    • Windows
      • Modern Workplace
    • macOS
    • Android
    • iOS
    • Automation
      • Logic Apps
      • Intune Monitoring
      • GitHub
    • Security
      • Passwordless
      • Security
    • Speaking
    • About me
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Home»Intune»Intune Mobile Application Management
    Intune

    Intune Mobile Application Management

    Peter KlapwijkBy Peter KlapwijkSeptember 13, 2016Updated:December 3, 20193 Mins Read

    A lot of people today use mobile devices like an Android smartphone or iPad to get access to corporate data, like email. This data may contain sensitive information which needs to be protected outside the corporate network. Companies started to use Mobile Device Management (MDM) solutions to keep their corporate data secure on company owned and BYO devices and blocking access to unmanaged devices. These MDM solutions take over the control of the whole device. As a result employees will no longer user their private device (BYOD) to access the company data, because they do not want their company to get in control of the device they own. Private data, like photo`s, email or text messages are on the device. Employees may think the company is able to view all this private information. And what happens with the data when a employee leaves the company? A lot of companies will wipe the device, including that private data! For a lot of employees that is a reason not to use their own device anymore, even if that means they have no access to the corporate data on the way. For the company this is an unwanted situation either, employees may become less productive by not using the personal devices anymore. The company may resolve this unwanted situation by providing all these employees with a device from the company, but that is a very expensive solution. Another solution, provided by Microsoft since a few months, is to implement Intune Mobile Application Management (MAM) for these private devices.

    Intune MAM allows the company to selectively control mobile applications like Microsoft Outlook, Word, Excel and OneDrive, without the need to take total control of the device. You can use it next to your existing MDM solution (even if that is from a third-party) for the control of corporate devices and use Intune to control the applications (and data) on the employees private device.

    intune-mobile-application-management-settings-androidWith MAM you can setup policies to control what your employees are allowed or not allowed to do with data inside these MAM controlled applications. Think of options like restricting copy/ paste with other apps and encrypting the data in the managed apps. As an administrator you can selectively wipe apps and data without the need to completely wipe an device, which prevents the loss of private data.
    Using MAM instead of MDM for employees personal devices, keeps you as an administrator in control of the corporate data and the employee in control of the private data. And productivity stays on the the same level as before.

    For more information about Intune MDM and MAM you can visit this site.

    More information about the out-of-the-box controlled applications supported by Intune MAM visit this site.

    Android EMS Intune iOS Microsoft 365 Microsoft Endpoint Manager Security
    Share. Facebook Twitter LinkedIn Email WhatsApp
    Peter Klapwijk
    • Website
    • X (Twitter)
    • LinkedIn

    Peter is a Security (Intune) MVP since 2020 and is working as Modern Workplace Engineer at Wortell in The Netherlands. He has more than 15 years of experience in IT, with a strong focus on Microsoft technologies like Microsoft Intune, Windows, and (low-code) automation.

    Related Posts

    Enable passwordless authentication to Windows 10 with Yubico security keys

    November 6, 2019

    Force Outlook on iOS and Android to access the Exchange Online mailbox

    March 29, 2019

    Deploy Heimdal Security with Microsoft Intune

    December 22, 2017
    Add A Comment
    Leave A Reply Cancel Reply

    Peter Klapwijk

    Hi! Welcome to my blog post.
    I hope you enjoy reading my articles.

    Hit the About Me button to get in contact with me or leave a comment.

    Awards
    Sponsor
    Latest Posts

    Create deployment ring groups for Microsoft Intune

    June 27, 2025

    Update Windows Defender during Windows Autopilot enrollments

    May 16, 2025

    Hide the “Turn on an ad privacy feature” pop-up in Chrome with Microsoft Intune

    April 19, 2025

    How to set Google as default search provider with Microsoft Intune

    April 18, 2025
    follow me
    • Twitter 4.8K
    • LinkedIn 6.1K
    • YouTube
    • Bluesky 1.5K
    Tags
    Administrative Templates Android Automation Autopilot Azure Azure AD Browser Conditional Access Edge EMS Exchange Online Feitian FIDO2 Flow Google Chrome Graph Graph API Identity Management Intune Intune Monitoring iOS KIOSK Logic Apps macOS MEM MEMMonitoring Microsoft 365 Microsoft Edge Microsoft Endpoint Manager Modern Workplace Office 365 OneDrive for Business Outlook Passwordless PowerApps Power Automate Security SharePoint Online Teams Windows Windows 10 Windows10 Windows 11 Windows Autopilot Windows Update
    Copy right

    This information is provided “AS IS” with no warranties, confers no rights and is not supported by the authors, or In The Cloud 24-7.

     

    Copyright © 2025 by In The Cloud 24-7/ Peter Klapwijk. All rights reserved, No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

    Shorthand; Don’t pass off my work as yours, it’s not nice.

    Recent Comments
    • Parth Savjadiya on Using Visual Studio with Microsoft Endpoint Privilege Management, some notes
    • Chris Johnson on Assign Deny Local Log On user right to an (Azure) AD group by using Microsoft Intune
    • Northernsky on Automatically wipe a Windows 10 device after a number of authentication failures
    • Henrik on Intune Driver update for Windows – Get applicable devices
    • Adam on Get notified on expiring Azure App Registration client secrets
    most popular

    Application installation issues; Download pending

    October 1, 2024

    Restrict which users can logon into a Windows 10 device with Microsoft Intune

    April 11, 2020

    How to change the Windows 11 language with Intune

    November 11, 2022

    Update Microsoft Edge during Windows Autopilot enrollments

    July 9, 2024
    Peter Klapwijk – In The Cloud 24-7
    X (Twitter) LinkedIn YouTube RSS Bluesky
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    Manage Cookie Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
    View preferences
    {title} {title} {title}