App Protection Policy in Intune App Protection

Intune – Mobile Device Management – App Protection Policy in Intune App Protection

Scenario – We want to securely publish a corporate app (OneDrive) to users who will be using their own mobile ( iOS) devices. We want to protect the corporate data used in the app and establish authentication before accessing it. Users should not be able to copy and paste data directly from the app on to their own device.

We need to create an an App Protection Policy in Intune App Protection.

For more in-depth detail:

https://docs.microsoft.com/en-us/mem/intune/apps/apps-add

https://docs.microsoft.com/en-us/mem/intune/apps/apps-deploy

https://docs.microsoft.com/en-us/mem/intune/apps/app-protection-policy-settings-ios

Create an App Protection Policy

  1. From the main Intune App Protection Home Screen: Select App protection policies -> Create policy -> iOS/iPadOS

  2. Fill out the Name and Description screen and then click Next.

  3. Select Unmanaged Apps in the Device Types drop down menu and select the Onedrive App in the Public apps section. Click Next

  4. On the Data Protection Screen you can select from several controls on what users can and cannot do with the corporate data that the App access. Work with your IT Security and Data Protection team  to understand what their requirements are. Click Next

  5. The Access Requirements screen allows you to add a layer of authentication to opening the App on the users own device. You can choose between various PIN types and options – again work with your IT Security teams on what they require. Click Next

    or

  6. The Conditional launch screen allows you to be more granular on what conditions the Device and the App have to meet for the App to be launched (Min OS and Max PIN attempts for example). Click Next.

  7. On the Assignments Page Select the Group who you want to apply this policy to and then click Next.

  8. Review your setting on the Review + Create Screen and then click Create

Read More

Intune Company Portal Install On An iPhone Device – MDM

Intune – Mobile Device Management – Intune Company Portal Install On An iPhone Device

Lets focus on BYOD (Bring Your Own Device)

Example Apple – iOS enrolment

BYOD

  • Devices are not wiped during enrolment
  • Device is associated with a user
  • Users can unenroll the device

At this point we should have completed the basics in the Intune configuration portal

  1. Install the “Intune Company Portal” application in the App Store


  1. Open the Intune Company Portal App


2. Sign in or Just select your Office365 account > Continue


3. Begin


4. Continue or Select Can


5. Continue


6. Continue


7. Allow


8. Close


9. Settings > Profile Downloaded


10. Install


11. Enter Passcode


12. Install
 

13. Install

15. Trust

16. Done

 

17. Close settings – Note “Mobile Profile”
18. Back to app and click “Continue Now”

19. Done
—-

Success !!! Device is now enrolled and awaiting apps and policies


Intune – MDM – Device Enrolment – Add an iPhone Device

Intune – Mobile Device Management – Device Enrolment – Add a Device

Lets focus on BYOD (Bring Your Own Device)

Example Apple – iOS enrolment

BYOD

  • Devices are not wiped during enrolment
  • Device is associated with a user
  • Users can unenroll the device

At this point we have already completed the Pre Req’s (See Apple MDM Push Certificate if you haven’t done this already)

Apple Configurator / Devices

https://devicemanagement.microsoft.com

We need to add an iOS device you will need the serial number and device detail in a CSV file to import

CSV format <device serial>,<Detail Owner? Device type)

Add a device

Devices> iOS > Apple Configurator

Have you created a Profile? Create a Profile before adding a device, see this guide

Select a profile and import your CSV file contain all your devices. Then click add.

Success !! Devices Added

Additional info from Microsoft Docs available here

Intune – Apple MDM Push Certificate

Intune – Mobile Device Management – Device Enrolment – Apple MDM Push Certificate

Lets focus on BYOD (Bring Your Own Device)

Example Apple – iOS enrolment

BYOD

  • Devices are not wiped during enrolment
  • Device is associated with a user
  • Users can unenroll the device

MDM push Certificate required

Go to device management https://devicemanagement.microsoft.com

Enrol iOS devices in Intune


Devices > Apple Enrollment > Apple MDM Push Certificate

You will need an Apple ID used on your Device

Step 3 expanded….

Create your MDM push certificate redirects you to login to the Apple portal with your Apple ID

https://identity.apple.com/pushcert/

Click “Create a Certificate

Read, Tick and Accept the terms

Upload your CSR

Download Certificate

Then View Manage Certificates. Note Expiry date!


Now back to step 4.


Enter Apple ID

Step 5


Add your MDM push certificate


Click upload

Success….


Multiple displays on Windows 10

Connecting a monitor to your laptop. Find the correct cable and port.

Next, dual-monitor, which screen is where? Any order would work but having the physical location match the logical location set on the computer is a next option.

Step 1. Right click any blank space on the desk top background > click display settings

Step 2. Under the “Select and rearrange displays” section, drag and drop each display to rearrange them according to their physical layout on your desktop.

(If you’re not sure which monitor you’re selecting, click the Identify button to figure out.)

Step 3. Click the Apply button.

Once you complete the steps, Windows 10 will save the physical layout, and you’ll be able to work across each display and run apps without issues.

Secured By miniOrange