Browsed by
Category: App Protection

Let the Right Chromebook in

Let the Right Chromebook in

This blog will be about Chromebooks and MAM. I will also introduce a colleague of mine. He will co-author my blogs from now on, this will be our first joint effort. His name is Mark Uijtdewilligen. Please follow him on LinkedIn: Mark Uijtdewilligen | LinkedIn Today we received a call from a customer who wanted to buy Chromebooks. Our first reaction was “Huh? Why?” (his company is currently undergoing a transformation from a remote desktop environment to a modern MS365…

Read More Read More

To Retire or Not to Wipe.

To Retire or Not to Wipe.

This blog will be about when and why you need to perform a retire or a (selective) wipe when an employee exits the company or when their device is stolen. In one of my last blogs, I explained why it’s important you need to configure App protection policies.  I want to dedicate this blog to the different methods available how you could make sure when a user exits the company there is no company data or/and apps left on the…

Read More Read More

Captain App Protection and the Winter Browser

Captain App Protection and the Winter Browser

This blog will be about why  only securing your mobile apps and desktop clients on IOS and Android devices will leave some holes in your security In one of my last blogs, I showed you how to set up App protection policies on unmanaged and managed devices. The Chronicles of MAM – Call4Cloud Setting up IOS App protection policies After some feedback, I realized I did not show the conditions, which client apps should be selected. When you are configuring…

Read More Read More

App Protection: Attack of the third-party apps

App Protection: Attack of the third-party apps

In one of my last blogs, I showed how you can set up multiple App protection profiles to make sure your managed and unmanaged IOS devices could receive the correct app protection policy. In my opinion, you need to make sure you lower the security bar for the managed devices app protection policies. You really don’t want well-behaved employees who enrolled their own devices, become angry about the security barriers, and finding another way to share the data. Here is…

Read More Read More

App Protection: Resurgence

App Protection: Resurgence

This blog will be about some misunderstanding when conditional access is requiring app protection and/or approved apps? Every organization has BYOD users, these users want to have access to the company data from that same device. You want to make sure you are not only managing the devices, you also need to manage the apps. Some time ago I explained how you could allow managed and unmanaged devices and how to configure the app protection policies. The Chronicles of MAM…

Read More Read More

App protection and a disabled Account

App protection and a disabled Account

Today I realised I totally forgot to add this setting to my App protection baseline. This setting was released some months ago. You can configure this conditional launch setting within the app protection policy. You have got 2 options: Block access: When Intune has confirmed the user has been disabled in Azure Active Directory, the app blocks access to work or school data. Wipe data: When Intune has confirmed the user has been disabled in Azure Active Directory, the app…

Read More Read More

The Chronicles of MAM

The Chronicles of MAM

This blog will be about the managed and unmanaged App Protection Policies and how you could make sure it also works like it should on IOS devices. I will divide this blog into multiple parts Introduction Conditional Access App Protection Policies Android App Protection IOS App Protection IOS App Configurations Results 1. Introduction When we want to protect the company data we have got multiple options to choose from. Are you going to require compliant mobile IOS/Android devices, so each…

Read More Read More

The sum of all App protection policies

The sum of all App protection policies

Obviously, there is a need to use mobile devices to access company data. These devices and apps need to be secured. There are many articles written about when to use MDM and when to use MAM or combining them. This blog will be about troubleshooting App protection policies. This week we were enrolling new surfaces and mobile devices into Microsoft 365. It can be a struggle when you don’t have a greenfield tenant and you need to make sure the…

Read More Read More