Close Menu
Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Facebook X (Twitter) Instagram
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    • Home
    • Intune
    • Windows
      • Modern Workplace
    • macOS
    • Android
    • iOS
    • Automation
      • Logic Apps
      • Intune Monitoring
      • GitHub
    • Security
      • Passwordless
      • Security
    • Speaking
    • About me
    Peter Klapwijk – In The Cloud 24-7Peter Klapwijk – In The Cloud 24-7
    Home»Android»Secure personal mobile devices with Microsoft Intune and Lookout
    Android

    Secure personal mobile devices with Microsoft Intune and Lookout

    Peter KlapwijkBy Peter KlapwijkNovember 9, 2019Updated:February 21, 20206 Mins Read

    This week at Ignite, Microsofts Brad Anderson showed the new integration of Mobile Endpoint Security (MES) with Microsoft Intune for App Protection Policy (APP). There are already several Mobile Threat Defense partners, like Lookout, who had an integration with Intune, but the signals from those providers where used for the Mobile Device Management compliancy checks. Now this is expanded to App protection, which is a Mobile Application Management solution.

    Mobile Endpoint Security is a solution for mobile devices with iOS or Android as operating system. It provides comprehensive mobile security, to secure the devices against app, network and system security based threats.

    Before the integration of these MES solutions with Intune App Protection, it was only available on the Mobile Device Management level. This means companies could only enforce MES solutions on managed devices, which are usually corporate owned devices. On personal (BYOD) devices there was no solution to enforce the installation of a MES solution, or the user needed to enroll the personal device in a MDM solution, like Intune. With this new integration between Microsoft Intune and the Mobile Endpoint Security providers, this has changed.

    At the moment of writing only Lookout provides the new solution on both iOS and Android. So let`s have a look at how this needs to be configured in Intune. We also have a look at how this looks at a personal (Android) devices.

    In this article I assume the connection between Microsoft Intune and Lookout for Work is already in-place and will therefor not show how that setup is done.

    Mobile Threat Defense Connector

    We first enable the integration between Microsoft Intune and Lookout for Work for Application Protection Policy. This can be done by using the Microsoft Endpoint Manager console (Intune portal).

    • Sign-in to the Device Management Portal
    • Browse to Tenant administration – Connectors and Tokens
    • Browse to Mobile Threat Defense (MTD)
    • Click the MTD connector (Lookout for Work) to edit the connector settings
    • Under App Protection Policy settings set both switches to On
    • Click Save

    By enabling MTD for Application Protection Policy, on the background a classic Conditional Access policy is created, named [Lookout MTP] Device Policy. The policy should not be edited, as stated by the documentation.

    Create an Application Protection Policy

    To enforce the use of Lookout for Work on a personal device we need to create an Application Protection policy. In this example I create a new policy for unmanaged devices, by setting devices types to unmanaged. But you can also edit an existing policy or apply it to all or only managed devices.
    In this policy we set what will happen when the minimum threat level is exceeded; Block Access or Remove corporate data.

    • Still in the Device Management Portal
    • Browse to Apps – App protection policies
    • Click Create policy
    • Choose Android or iOS/ iPadOS
    • Give the policy a Name
    • Enter a Description (optional)
    • Click Next
    • Set Target to apps on all device types to No
    • Choose Unmanaged as Device type
    • In the Apps section choose the apps to which the policy should apply
    • Click Next
    • Choose your preferred settings on the Data protection tab
    • Click Next
    • Choose your preferred settings on the Access requireents tab
    • Click Next

    On the Conditional Launch tab under Device conditions we add Max allowed device threat level as setting, to enforce Lookout for Work on the targeted devices. Under value we set the maximum allowed threat level. Under action we choose what happens when the threat level is above the maximum level; Block access or Wipe data.

    • Add Max allowed threat level as Setting
    • Choose the preferred threat level under Value
    • Choose the Action
    • Click Next
    • Select a security group of choice to assign the policy to
    • click Next
    • Click Create

    The setup part is finished, let`s move over to our personal, unmanaged mobile device.

    End-user experience: Setup Outlook

    I show the end-user experience on an un-managed Android devices. I already authenticated with username and password, the account is added to Outlook.

    As the App protection Policy comes in directly, we are enforced to install the Company Portal app. The Company Portal app is needed to apply the APP policy on Android devices.
    Click Go to store, to open the App store. Download and install the Company Portal app.
    There is no need to sign-in to the Company Portal app, as that will enroll your device in Intune (for MDM).

    After the Company Portal app is downloaded, we are enforced to register the device (at Azure AD).

    When registration is finished and we switch back to Outlook, we see an new pop-up screen. The screen shows us the next step we need to take before we can access the mailbox, set up the Lookout for Work app.
    Click Download.

    The App store is opened, click Install to install Lookout for Work.

    When we switch back to Outlook without setting up the Lookout for Work app, below screen is shown. Click Launch, to setup Lookout for Work.
    When Lookout for Work is setup, click Recheck.

    The status is rechecked, Confirming app status…..

    Everything is set, access to the mailbox is allowed.

    End-user experience: threat is detected

    To see how this all works when a threat is detected, you can search the Google Play store for an Antivirus Test app. I used Zoner AntiVirus Test.

    As soon as the antivirus test app is installed, Lookout shows a message Lookout Virus Alert. ” Zoner AntiVirus Test” is a virus. The threat level of the device is raised.

    As the threat level exceeds the maximum set threat level, access is blocked.
    After removing the threat, click Recheck, to gain access again to the mailbox.

    Or, depending on the action which is set in the App Protection Policy, the Organizational data is removed.

    I only tested the setup with an Android device, but it is of course also available for iOS devices. the experience is pretty well, when a threat is detected, access to the mailbox is blocked (almost, takes a very small time) immediately.
    It seems a very nice solution for companies who support BYOD and don`t require their users to enroll their devices in Intune for Corporate access, but still want to be sure a Mobile Endpoint Security solutions runs on these devices.

    Happy testing!

    Android EMS Identity Management Intune MEM Microsoft 365 Microsoft Endpoint Manager Outlook Security Windows10
    Share. Facebook Twitter LinkedIn Email WhatsApp
    Peter Klapwijk
    • Website
    • X (Twitter)
    • LinkedIn

    Peter is a Security (Intune) MVP since 2020 and is working as Modern Workplace Engineer at Wortell in The Netherlands. He has more than 15 years of experience in IT, with a strong focus on Microsoft technologies like Microsoft Intune, Windows, and (low-code) automation.

    Related Posts

    MEM Monitoring: Get notified on Intune Configuration profile changes

    August 2, 2021

    Automatically configure Outlook contact sync to the native contacts app with Microsoft Intune

    July 6, 2020

    Force Outlook on iOS and Android to access the Exchange Online mailbox

    March 29, 2019
    Add A Comment
    Leave A Reply Cancel Reply

    Peter Klapwijk

    Hi! Welcome to my blog post.
    I hope you enjoy reading my articles.

    Hit the About Me button to get in contact with me or leave a comment.

    Awards
    Sponsor
    Latest Posts

    Update Windows Defender during Windows Autopilot enrollments

    May 16, 2025

    Hide the “Turn on an ad privacy feature” pop-up in Chrome with Microsoft Intune

    April 19, 2025

    How to set Google as default search provider with Microsoft Intune

    April 18, 2025

    Using Windows Autopilot device preparation with Windows 365 Frontline shared cloud PCs

    April 13, 2025
    follow me
    • Twitter 4.8K
    • LinkedIn 6.1K
    • YouTube
    • Bluesky 1.5K
    Tags
    Administrative Templates Android Automation Autopilot Azure Azure AD Browser Conditional Access Edge EMS Exchange Online Feitian FIDO2 Flow Google Chrome Graph Graph API Identity Management Intune Intune Monitoring iOS KIOSK Logic Apps macOS MEM MEMMonitoring Microsoft 365 Microsoft Edge Microsoft Endpoint Manager Modern Workplace Office 365 OneDrive for Business Outlook Passwordless PowerApps Power Automate Security SharePoint Online Teams Windows Windows 10 Windows10 Windows 11 Windows Autopilot Windows Update
    Copy right

    This information is provided “AS IS” with no warranties, confers no rights and is not supported by the authors, or In The Cloud 24-7.

     

    Copyright © 2025 by In The Cloud 24-7/ Peter Klapwijk. All rights reserved, No part of the information on this web site may be reproduced or posted in any form or by any means without the prior written permission of the publisher.

    Shorthand; Don’t pass off my work as yours, it’s not nice.

    Recent Comments
    • Adam on Get notified on expiring Azure App Registration client secrets
    • Peter Klapwijk on Update Windows Defender during Windows Autopilot enrollments
    • Rob van de Ven on Add a certificate to the Trusted Publishers with Intune without reporting errors
    • Carl on Update Windows Defender during Windows Autopilot enrollments
    • Peter Klapwijk on The next step in a passwordless Windows experience
    most popular

    Application installation issues; Download pending

    October 1, 2024

    Restrict which users can logon into a Windows 10 device with Microsoft Intune

    April 11, 2020

    How to change the Windows 11 language with Intune

    November 11, 2022

    Update Microsoft Edge during Windows Autopilot enrollments

    July 9, 2024
    Peter Klapwijk – In The Cloud 24-7
    X (Twitter) LinkedIn YouTube RSS Bluesky
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    Manage Cookie Consent
    To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
    Functional Always active
    The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
    Preferences
    The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
    Statistics
    The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
    Marketing
    The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
    Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
    View preferences
    {title} {title} {title}