Intune Stuff | The Community place for Microsoft Intune, Intune Suite, Autopilot, macOS Management, Copilot for Security.

How To Setup MAM (Mobile Application Management) In Intune – The Series Part 3: Windows

by | Sep 11, 2024 | Application Management, Blog, Conditional Access, Device Management, Edge, Featured Post, Intune, MAM, MDM, Microsoft, Most Popular, News, Security, Top Stories | 5 comments

Hi Community,

This will be the 3th of 3 guides on how to setup MAM (Mobile Application Management) in Intune. In this 3th part i will cover Windows.

We’ll explore how to protect company data on unmanaged Windows devices using Microsoft Intune. For simplicity, We’ll establish guardrails to ensure company information remains secure while still allowing personal access to organizational data for productivity.

We’ll use Mobile Application Management (MAM) for unmanaged devices, often referred to as personal or BYOD (Bring Your Own Device) devices. These are devices over which your IT staff has no control over their settings.

 

What Is MAM (Mobile Application Management)?

 

Mobile Application Management (MAM) is a type of security management focused on controlling and securing mobile applications used within an organization. It involves provisioning, configuring, and managing mobile apps on both company-provided and personal devices.

Key features of MAM include:

  • App Configuration: Setting up app-specific policies and configurations.
  • Data Protection: Ensuring that sensitive organizational data within apps is secure and not leaked.
  • Access Control: Managing who can access specific apps and data.
  • App Updates: Keeping apps up-to-date with the latest features and security patches.

MAM is particularly useful for organizations that need to secure data on personal devices without requiring full device management. This allows employees to use their own devices for work while ensuring that corporate data remains protected.

 

Combining App Protection policies with Conditional access policies you can create a secured application environment for your users without the need of managing the complete device. With MAM configured you don’t need to “fully” enroll your device Intune.

 

Implementing MAM has these benefits:

  • Enhanced Data Security – Provides a layer of security for organization data on unmanaged devices by setting policies to control how company data is accessed and shared within apps.
  • Increase Flexibility – Give your users access to company data such as Outlook, Excel etc. without having to enroll their devices under management.

 

 

App Protection Policies

As stated in my 2 previous articles, iOS and Android we used the 3 pre-defined levels of app protection, for Windows this is somewhat different. Windows conditional launch settings are labeled as Health Checks for instance. However we still have the 3 pre-deficed levels.

 

  • Level 1 enterprise basic data protection:
    Level 1 is the minimum data protection configuration for an enterprise mobile device. This configuration replaces the need for basic Exchange Online device access policies by requiring a PIN to access work or school data, encrypting the work or school account data, and providing the capability to selectively wipe the school or work data. However, unlike Exchange Online device access policies, the below App Protection Policy settings apply to all the apps selected in the policy, thereby ensuring data access is protected beyond mobile messaging scenarios. The policies in level 1 enforce a reasonable data access level while minimizing the impact to users and mirror the default data protection and access requirements settings when creating an App Protection Policy within Microsoft Intune.

 

  • Level 2 enterprise enhanced data protection:
    Level 2 is the data protection configuration recommended as a standard for devices where users access more sensitive information. These devices are a natural target in enterprises today. These recommendations don’t assume a large staff of highly skilled security practitioners, and therefore should be accessible to most enterprise organizations. This configuration expands upon the configuration in Level 1 by restricting data transfer scenarios and requiring a minimum operating system version.

 

  • Level 3 enterprise high data protection:
    Level 3 is the data protection configuration recommended as a standard for organizations with large and sophisticated security organizations, or for specific users and groups who will be uniquely targeted by adversaries. Such organizations are typically targeted by well-funded and sophisticated adversaries, and as such merit the additional constraints and controls described. This configuration expands upon the configuration in Level 2 by restricting additional data transfer scenarios, increasing the complexity of the PIN configuration, and adding mobile threat detection.

 

As with any deployment of new software, features or settings, Microsoft recommends investing in a ring methodology for testing validation prior to deploying the APP data protection framework. Defining deployment rings is generally a one-time event (or at least infrequent), but IT should revisit these groups to ensure that the sequencing is still correct. Microsoft recommends the following deployment ring approach for the APP data protection framework:

 

MAM

 

As the above table indicates, all changes to the App Protection Policies should be first performed in a preproduction environment to understand the policy setting implications. Once testing is complete, the changes can be moved into production and applied to a subset of production users, generally, the IT department and other applicable groups. And finally, the rollout can be completed to the rest of the mobile user community. Roll out to production may take a longer amount of time depending on the scale of impact regarding the change. If there’s no user impact, the change should roll out quickly, whereas, if the change results in user impact, rollout may need to go slower due to the need to communicate changes to the user population.

To ensure that only apps supporting App Protection Polices access work or school account data, Microsoft Entra Conditional Access policies are required.

I have already created the 3 levels of security in JSON files, you can download them here:

Just unzip the JSON files and you can import them in Intune.

 

You can import policies in Intune with the Intune Management Tool created by Mikael Karlsson

The full Microsoft article is here.

 

 

 

How To Setup MAM

 

First we need to block BYOD (Bring your own device) enrollment. This can be done by going to the intune portal – Devices – enrollement – Windows – Device Platform restriction

 

MAM

 

Here click all users and in the next screen properties.

 

MAM

 

Click edit and setup personally owned Windows (MDM) to block

 

MAM

 

Set up Windows Security Center

 

To ensure that unmanaged devices accessing our company data are secure, we should set up the Windows Security Center.

Go to Tenant Administration – Connectors and Tokens – Mobile Threat Defense – Add – Windows Security Center

 

MAM

 

The connector status will not show as “Enabled” until the first MAM user enrollment is completed for your tenant. Once a MAM enrollment completes, you will see the status update to “Enabled” within 30 minutes.

 

Setup the Conditional Access Policies

 

I will begin with the creation of the 2 Conditional Access Policies, after the Conditional Access Policies i will go further with the App Protection policy and I will conclude with the user experience.

Require App protection CA Policy

Go to the Intune Portal – Endpoint Security – Conditional access – Policies – Create new Policy (Yes you can go via the Azure or Entra Portals but I will stick in the Intune Portal)

MAM

MAM

 

Microsoft has some guideline to name your Conditional Access policy, you can find this here. You can use this if you want, not mandatory.

 

Name your policy, according to the guidelines above, or just give it a name that is clear to you. E.g. MAM for Windows.

 

MAM

 

Select the group or user that best fits your needs.

 

MAM

 

Select Target resources such as “Cloud Apps” or specifically “Office 365.”

 

MAM

 

Set the Conditions targeting the Device Platform, as this will tell us the platform the user is signing in from. In this case Windows.

 

MAM

 

Under Client apps, select Browser, in our app protection policy we have set Edge as the protected app.

 

Microsoft Edge (v117 stable branch and later for Windows 11 and v118.0.2088.71 and later for Windows 11)

 

MAM

 

Now, go to Access Controls and specify the requirements to get access. I have chosen Grant access by Requiring app protection policies to be in place.

 

MAM

 

Now go to Session and enable the use Conditional Access App Control – select Block downloads (Preview)

 

Switch the policy to on and click create. Now you have configured the Conditional Access policy. Let’s go to the next Conditional Access Policy.

 

Allow Web Access CA Policy

Now we are going to block non-corporate devices from accessing anything, just the browser. We will do this by means of requiring compliance. as MAM uses API’s to configure the browser we cannot just do a block, this will not work here so we will grant but we will require compliance which will block BYOD.

Go to the Intune Portal – Endpoint Security – Conditional access – Policies – Create new Policy (Yes you can go via the Azure or Entra Portals but I will stick in the Intune Portal)

MAM

MAM

 

Microsoft has some guideline to name your Conditional Access policy, you can find this here. You can use this if you want, not mandatory.

 

Name your policy, according to the guidelines above, or just give it a name that is clear to you. E.g. MAM for Windows Block BYOD.

 

MAM

 

Select the group or user that best fits your needs.

 

MAM

 

Select Target resources such as “Cloud Apps” or specifically “Office 365.”

 

Don’t choose all cloud apps but choose Office 365. Otherwise the API will be blocked.

 

 

Set the Conditions targeting the Device Platform, as this will tell us the platform the user is signing in from. In this case Windows.

 

MAM

 

Now we want to let the browser though.

 

MAM

 

Exclude corporate device with the filter.

 

MAM

 

Under Grant, select require device to be marked compliant.

 

MAM

 

Switch the policy to on and click create. Now you have configured the 2nd Conditional Access policy. Let’s go to the next App Protection Policy.

 

Configure the App Protection policy – MAM Policy

If you have imported the JSON files for the MAM polices into your Intune environment the MAM policies are already there, you can always create your own MAM policies of course, i will continue this guide from the ones that i have configured according to the Microsoft Framework.

I will use the Level 2 MAM policy in this guide.

In the Intune portal go to Apps – App protection, here the 3 app protection policies are in place.

 

 

The settings in this MAM policy correspond to the settings that Microsoft offers in the Data Framework.

 

 

MAM

 

For me these MAM settings are OK, you can always change them to your needs if you want. I consider this as Microsoft best practice. If you are happy with the MAM settings assign this policy to a group of your choice, in my case this is the pilot user group.

 

In this MAM policy you can see that the targeted public app is Edge. We don’t have any other choice while configuring the app protection policy. I’m hoping to get more apps here in the future.

 

MAM

 

I suggest to test these MAM policies in the field by indicating some key users. The importance lies in testing the MAM policies in a real life scenario and to let the key users test it for a few weeks or months so that every function/app is tried. Let them report back you you on a regular base. Only by doing so you will have a better view on how the users experience the MAM behavior and you can act accordingly if necessary.

 

User Experience

I will show you the “setup” for Edge and some copy paste and download attempts and also i will try to get to e.g. outlook.office.com with Chrome instead of Edge. Here we go.

 

Let’s try to access our company resources with Chrome – office.com. Immediately we get the message that this is not possible and that we need to use Edge.

 

MAM

 

Now lets do the same in Edge. Now we get the message that we need to sign into Edge with our work account. Click Switch Edge profile.

 

MAM

 

Click sign in to sync data, now a new Edge profile with your company credentials will be created.

 

MAM

 

Sign in with you company credentials.

 

MAM

 

Now a VERY important thing. Uncheck the box Allow my organization to manage my device and click OK, DON’T click No sign in to this app only.

 

This is what microsoft says about this:

MAM

The full article on this is here:

 

 

 

MAM

 

After the sign in you will be presented with this screen, click Done.

 

 

Now we have to wait untill Edge finishes. This can take a few minutes so be patient and don’t click cancel.

 

MAM

 

When it’s done click continue.

 

MAM

 

And we are in!

 

MAM

 

If you click on the top left corner you can see your Work profile in Edge.

 

MAM

 

Now to the cool stuff of downloading and copy pasting. I will test some stuff in Outlook Web Access

Let’s try to copy some text from a mail.  As soon as you click copy you will be presented by this message:

 

MAM

 

Now let’s try to download one of the attachements. As soon as you click download you will be presented by this message:

 

 

Now let’s say that this user tries to install the Office apps from the corporate license onto his personal machine, i don’t think so 😉

 

 

Now let’s try to connect Onedrive. Now we get the message that says that our device needs to be compliant:

 

MAM

 

You can also check the App Protection status on the monitor page in Intune:

 

MAM

 

Retire the Device

 

Now let’s say my consultancy project with this customer is ending and they want to remove the company data from my device. Normally for an enrolled device you would go to the device in the Intune portal and do a retire.

However because this is a personal device and this device is NOT enrolled in Intune the device it will not show up in the lntune device list.

 

MAM

 

The device will show in the Office 365 portal under devices – active devices – app managed.

 

MAM

 

This concludes the last part of guides of the MAM series.

I hope you find this article helpful, And as always if you feel there is something in error or you want to add some stuff from your own experience don’t hesitate to contact me!

5 Comments

  1. Kamal

    Hi. why did you choose not to include a device filter for the Require App protection CA Policy to target unmanaged devices
    e.g Include: device.trustType -ne “AzureAD” -and device.trustType -ne “ServerAD”

    Reply
    • joery

      Hi, just a choice, you can do that if you want to.

      Reply
  2. Alex

    Hi, i want to apply this CA only to Personal devices, but i have error when i try access in Company devices

    Reply
    • Dave

      You can filter via Hybrid Join rather than using company in the filter.
      This would be best for BYOD (personal devices)

      Reply
  3. Dave

    Hi,

    Is there a way to allow copy/cut/paste between the Edge tabs when in session rather than to all third-party apps or services/sites.

    Reply

Submit a Comment

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Discover more from IntuneStuff

Subscribe now to keep reading and get access to the full archive.

Continue reading