Close Menu
Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Facebook X (Twitter) Instagram
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    • Home
    • Intune
    • Windows
      • Modern Workplace
    • macOS
    • Android
    • iOS
    • Automation
      • Logic Apps
      • Intune Monitoring
      • GitHub
    • Security
      • Passwordless
      • Security
    • Speaking
    • About me
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Home»Android»Secure Outlook Mobile with App Protection Policies
    Android

    Secure Outlook Mobile with App Protection Policies

    Peter KlapwijkBy Peter KlapwijkApril 3, 2019Updated:March 18, 202096 Mins Read

    Last week I wrote an article about how we can force our users to use Outlook Mobile on Android and iOS devices. In this new (followup) article we go one step further in securing mobile access to our Exchange Online mailboxes by applying App Protection Policies to Outlook. With Intune App Protection Policies (APP) we can secure the company data in the Outlook mobile app, whether the device is managed or unmanaged. For example we can restrict saving email attachments to the local device or copy/ paste text from Outlook to a unmanaged app.
    APP is a Mobile Application Management solution which manages the application to secure company data and not the device itself. Policies are applied at the application level instead of the device level which is the case with a Mobile Device Management Solution.

    Setup the App Protection Policy

    1. Open the Device Management Portal and click Client Apps
    2. Click App protection policies
    3. Click Create policy to create a new policy

    1. Give the APP a Name and Description (optional)
    2. Choose your Platform; Android or iOS
    3. Under Target to all app types choose Yes to target apps on devices of any management state.
      You can also choose No to choose one or two management states.

    1. Click the Apps tab
    2. Select all apps you want to associate with the APP
    3. Click Select

    1. Click the Settings tab
    2. Click Data Protection tab
    3. Make a decision on your required data protection settings
      For example prevent saving Org data to the local device, but allow saving to OneDrive and require encryption of Org data
    4. Click OK

    1. Click the Access requirements tab
    2. Make a decision on your required access requirement settings
      For example choose to require a PIN code to access the managed apps and the PIN type
    3. Click OK

    1. Click the Conditional launch tab
    2. Take note of the settings, most of the time the default settings are fine
    3. Click OK (twice) and click Create

    When the App Protection Policy is created we need to assign the policy to a security group. On the assignments tab choose the group of your choice and click Save.

    The App Protection policy is now active, but since this week we have the option to set Require app protection policy as part of a Conditional Access policy. A very usefull expansion of the options we already had in the CA policies to prevent access to company data when the APP is not yet applied.
    To see how to create a CA policy and use this setting, have a look at my previous post where we created a CA policy.

    End-User experience

    In my lab I have already enabled the Conditional Access policy as described in the previous post to set Outlook Mobile as a required (approved) app to access Exchange Online. I also expanded the CA Policy with the control Require app protection policy which is applied to my test user.
    The user experience is the same as in the previous post, when you sign-in to the Outlook app you need to download the broker app.

    When the broker app is downloaded you need to register your device.

    The difference now is, you get a message Your organization protects data in this app. The Outlook app needs a restart and the company profile is applied.


    When you set a PIN code for access as a requirement, by opening Outlook you need to create a PIN code.
    When the PIN code is created you are taken to your Inbox.

    Now also have a look at some of the restrictions which are active on the work profile in Outlook. If you have added a work profile and a personal profile (Outlook, Hotmail), those restrictions are not applied to the personal profile. This is a great solution for bring your own devices.

    One of the data protection restrictions we can set is to allow or block copy/paste actions. We can block copy/paste actions to unmanaged apps like in the below screen. You copy text in an email, but when you paste it in an unmanaged app you get the Message Your organization`s data cannot be pasted here.
    Depending on the settings you set, it is allowed to paste in to Outlook from unmanaged apps and/ or it is allowed to copy/paste to another managed app.

    Another restriction we can set is blocking a screen capture.

    We can restrict opening web links to a managed browser. Especially when allowing access to on-premises hosted web applications via the AAD Application Proxy, this helps you to keep company data secure.

    When you don`t want the contacts to be saved to the local mobile device, we have the option to block that. As you can see the switch to turn on contacts sync is not available.

    Not only copy/ paste actions can be blocked, we can also restrict opening email attachments. Below Word an attachment cannot be opened outside of the managed apps. When the user installs Word on his mobile device (Word is part of the managed apps list I selected) he is allowed to open the Word file.

    We cannot only restrict opening email attachments, but also control if and where we can save those attachments. We can restrict saving attachments to the local device, but allow saving directly in to OneDrive or SharePoint. Another option is to completely block saving attachments.

    Besides all those visible controls for the end-user it is also a good idea to set the encryption requirement on. This will encrypt the company data in the managed app.

    Perform a App Selective Wipe

    Because App Protection Policies is an Application Management Solution, we can perform a wipe action from the Intune portal on the application level. To perform an App Selective Wipe follow below steps.

    1. Open the Device Management Portal
    2. Click Client apps – App selective wipe – Create wipe request

    1. Click the User tab
    2. Search for the user and select the user
    3. Click the Device tab
    4. Select the device which need to be wiped
    5. Click Create

    Back at the Selective Wipe tab we can see the status of the wipe request. If the device is connected to the internet, the wipe is started immediately after creating the request.

    At the mobile device the company data is removed from the app. In Outlook the company profile is completely removed.

    By following this and the previous article, we have deployed Outlook in a secure way!

    The App Protection Policy can be expanded with the requirement of a minimum Threat Level by integrating a Mobile Threat Defense Partner with Intune as you can read in this post.

    Android Conditional Access EMS Exchange Online Intune iOS MEM Microsoft 365 Microsoft Endpoint Manager Outlook Security
    Share. Facebook Twitter LinkedIn Email WhatsApp
    Peter Klapwijk
    • Website
    • X (Twitter)
    • LinkedIn

    Peter is a Security (Intune) MVP since 2020 and is working as Modern Workplace Engineer at Wortell in The Netherlands. He has more than 15 years of experience in IT, with a strong focus on Microsoft technologies like Microsoft Intune, Windows, and (low-code) automation.

    Related Posts

    Prevent Edge Desktop Shortcut creation upon install with Microsoft Intune

    June 13, 2020

    Force Outlook on iOS and Android to access the Exchange Online mailbox

    March 29, 2019

    Azure AD Self-Service Password Reset

    September 12, 2016
    View 9 Comments

    9 Comments

    1. Rkast on April 5, 2019 10:24

      Since when do we need a broker app with APP(MAM)? This due to the fact you used ‘required client’ in the CA policy? Then this is not really byod/mam anymore cause user has to register and enroll the device. Is it a AAD registration or intune enrollment when using the CP/broker app ?

      Reply
      • Peter Klapwijk on April 5, 2019 22:51

        You get this user experience when you set Require approved client app and/ or Require app protection policy in a CA policy. If you don`t use such a CA policy, users can still bypass the APP.
        And yes the device is AAD Registered.

        Reply
        • Nate on May 14, 2020 19:41

          Its actually based on OS. iOS doesn’t require the Intune Company Portal app and the controls are fully within the apps. On android, MAM policies will require the Intune Company Portal – but an important note is you don’t need to login to the portal app at all, it just needs to be on the device – the apps use it on the backend as the broker for Android. Logging into the portal app is only necessary in regards to full MDM and device policies.

          CA is really not necessary for the experience described above, if you apply MAM correctly you will force a pin, or secure the data regardless of a CA policy. This article is also missing that iOS MAM policies do not have an option for blocking screen capture.

          Directly from Microsoft on Android:
          “The Company Portal app is required for all apps that are associated with app protection policies on Android devices.

          For devices that are not enrolled in Intune, the Company Portal app must be installed on the device. However, the user does not have to launch or sign into the Company Portal app before they can use apps that are managed by app protection policies.

          The Company Portal app is a way for Intune to share data in a secure location. Therefore, the Company Portal app is a requirement for all apps that are associated with app protection policies, even if the device is not enrolled in Intune.”

          Directly from Microsoft on iOS
          “If the device is not enrolled in Intune, the user is asked to restart the app when they first use it. A restart is required so that app protection policies can be applied to the app.

          For devices that are enrolled for management in Intune, the user sees a message that their app is now managed.”

          Reply
          • Nate on May 14, 2020 20:02

            Also note, the only reason your device is AAD registered and the only reason you had to have the device registered with the Company Portal App (or Authenticator app on iOS) is because you are using the CA policy. This would largely only be good if you plan to push MDM level controls instead of MAM controls down to all devices. I would avoid this if you don’t want to enforce the use of the broker app for BYOD.

            From Microsoft:
            “In order to leverage this grant control, Conditional Access requires that the device be registered in Azure Active Directory which requires the use of a broker app. The broker app can be either the Microsoft Authenticator for iOS, or the Microsoft Company portal for Android devices. If a broker app is not installed on the device when the user attempts to authenticate, the user gets redirected to the app store to install the broker app.”

            “- Apps for app protection policy support the Intune mobile application management feature with policy protection.”
            ” – The Require app protection policy requirements:
            Only supports the iOS and Android for device platform condition.
            A broker app is required to register the device. On iOS, the broker app is Microsoft Authenticator and on Android, it is Intune Company Portal app.”

            Reply
            • Peter Klapwijk on May 15, 2020 10:41

              I would still recommend to use a CA policy to enforce the use of an Approved app or enforce the APP like described in the article. If you don`t require that, the user is able to use third-party apps to access the mailbox and the App Protection policy isn`t enforced of such a third-party app.
              And on iOS the broker app (Microsoft Authenticator) is still needed, referencing this article https://docs.microsoft.com/en-us/mem/intune/protect/app-based-conditional-access-intune

              Regards,

              Peter

    2. Sam on December 15, 2020 17:50

      How often will a user be prompted to enter their PIN / touch ID to access the Outlook app controlled by App Protection policy? I have timeout set to default of 30 mins and yet I never seem to get prompted for PIN even if the device is left overnight now? Will just unlocking the phone with fingerprint unlock the Outlook app by default?

      Reply
      • Peter Klapwijk on December 15, 2020 22:07

        Depending on Android version and/ or vendor there might be a settings ‘Use one lock’. Set to enabled it uses one lock for the work profile and device screen. Might be located under Accounts or in the separate Work profile settings section.

        Reply
    3. Pieter on June 16, 2022 17:19

      Peter voor welke licentie structuur is dit? ik heb 1 beheerder en 30 business standaards. werkt dat hier op? welke licenties heb ik allemaal nodig om dit te laten werken?

      Reply
      • Peter Klapwijk on June 26, 2022 09:33

        Pieter,

        As it involves Intune and Azure AD, for this you need licenses. That means you should purchase an EMS license (instead of separate an Intune and AZure AD license).

        Regards,

        Peter

        Reply
    Leave A Reply Cancel Reply

    Peter Klapwijk

    Hi! Welcome to my blog post.
    I hope you enjoy reading my articles.

    Hit the About Me button to get in contact with me or leave a comment.

    Awards
    Sponsor
    Latest Posts

    Hide the “Turn on an ad privacy feature” pop-up in Chrome with Microsoft Intune

    April 19, 2025

    How to set Google as default search provider with Microsoft Intune

    April 18, 2025

    Using Windows Autopilot device preparation with Windows 365 Frontline shared cloud PCs

    April 13, 2025

    Using Visual Studio with Microsoft Endpoint Privilege Management, some notes

    April 8, 2025
    follow me
    • Twitter 4.8K
    • LinkedIn 6.1K
    • YouTube
    Tags
    Administrative Templates Android Automation Autopilot Azure Azure AD Browser Conditional Access Edge EMS Exchange Online Feitian FIDO2 Flow Google Chrome Graph Graph API Identity Management Intune Intune Monitoring iOS KIOSK Logic Apps macOS MEM MEMMonitoring Microsoft 365 Microsoft Edge Microsoft Endpoint Manager Modern Workplace Office 365 OneDrive for Business Outlook Passwordless PowerApps Power Automate Security SharePoint Online Teams Windows Windows 10 Windows10 Windows 11 Windows Autopilot Windows Update
    Copy right

    This information is provided “AS IS” with no warranties, confers no rights and is not supported by the authors, or In The Cloud 24-7.

     

    Copyright © 2025 by In The Cloud 24-7/ Peter Klapwijk. All rights reserved, No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

    Shorthand; Don’t pass off my work as yours, it’s not nice.

    Recent Comments
    • Peter Klapwijk on Using Windows Autopilot device preparation with Windows 365 Frontline shared cloud PCs
    • John M on Using Windows Autopilot device preparation with Windows 365 Frontline shared cloud PCs
    • Christoffer Jakobsen on Connect to Azure file shares with Microsoft Entra Private Access
    • Ludo on How to block Bluetooth file transfer with Microsoft Intune
    • RCharles on Automatically configure the time zone (during Autopilot enrollment)
    most popular

    Application installation issues; Download pending

    October 1, 2024

    Restrict which users can logon into a Windows 10 device with Microsoft Intune

    April 11, 2020

    How to change the Windows 11 language with Intune

    November 11, 2022

    Update Microsoft Edge during Windows Autopilot enrollments

    July 9, 2024
    Peter Klapwijk – In The Cloud 24-7
    X (Twitter) LinkedIn YouTube RSS
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    Manage Cookie Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
    View preferences
    {title} {title} {title}