Intune App Protection Policies (MAM): Complete Guide
Learn how to protect organizational data using Intune App Protection Policies (Mobile Application Management) on both enrolled and unenrolled devices, including BYOD scenarios.
Intune App Protection Policies (APP), also known as Mobile Application Management (MAM), protect your organization's data at the application level on both company-owned and personal devices. These policies ensure corporate data remains safe and contained within managed apps, regardless of whether the device itself is enrolled in Intune.
What Are App Protection Policies?
App protection policies are rules that ensure an organization's data remains safe or contained in a managed app. A policy can be a rule enforced when users attempt to access or move "corporate" data, or a set of actions that are prohibited or monitored when users are inside the app.
Key Benefits
- Protect Data Without Device Enrollment: Secure corporate data on personal devices without full device management
- BYOD Support: Enable bring-your-own-device scenarios while maintaining security
- App-Level Protection: Control data access, sharing, and storage at the application level
- Cross-Platform Support: Works on iOS/iPadOS, Android, and Windows
- Conditional Access Integration: Integrate with Conditional Access for enhanced security
MAM Configurations
Intune supports two MAM configurations:
1. MAM Without Device Management (MAM Only)
This configuration allows your organization's apps to be managed by Intune without enrolling the devices. This is commonly referred to as MAM without device enrollment.
Benefits:
- No device enrollment required
- Users maintain privacy on personal devices
- IT controls only organization data
- Works with third-party MDM solutions
Limitations:
- Cannot deploy apps to devices
- Cannot provision certificate profiles
- Cannot provision Wi-Fi and VPN settings
For more information, see MAM configurations.
2. MAM With Device Management (MAM + MDM)
This configuration allows both your organization's apps and devices to be managed. This is commonly referred to as MAM + MDM.
Benefits:
- Full device management capabilities
- App deployment to devices
- Certificate provisioning
- Wi-Fi and VPN configuration
- Enhanced security controls
For details, see MAM with device management.
Creating App Protection Policies
Step 1: Access App Protection Policies
- Sign in to the Microsoft Intune admin center
- Navigate to Apps > App protection policies
- Select Create policy
Step 2: Select Platform
Choose the platform:
- iOS/iPadOS
- Android
Note: Windows MAM is available for Windows 10 and Windows 11 with specific requirements. See Data Protection for Windows MAM.
Step 3: Configure Basics
- Name: Enter a descriptive name for the policy
- Description: Optional description
- Target to apps on all device types:
- Yes: Apply policy to all device types
- No: Apply based on device management state
Step 4: Configure Data Protection Settings
Configure how data is protected within managed apps:
Data Transfer Settings
- Backup org data to iTunes and iCloud backups: Block or allow
- Send org data to other apps:
- Policy managed apps
- All apps
- None
- Save copies of org data: Block or allow
- Allow user to save copies to selected services: Choose services like OneDrive, SharePoint
Access Requirements
- PIN for access: Require PIN to open managed apps
- PIN type: Numeric or alphanumeric
- PIN length: Minimum PIN length
- Biometric instead of PIN: Allow fingerprint or face recognition
- Timeout: Require PIN after period of inactivity
Conditional Launch
- Max PIN attempts: Number of failed PIN attempts before app data is wiped
- Offline grace period: Days before app requires authentication
- Jailbroken/rooted devices: Block access or warn
For complete settings reference, see:
Step 5: Assign Apps
- Select Targeted apps
- Choose apps to protect:
- Core Microsoft Apps (includes Outlook, Teams, etc.)
- Custom apps (line-of-business apps)
- Select OK
Note: Apps must be integrated with the Intune App SDK or wrapped using the Intune App Wrapping Tool.
For a list of supported apps, see Microsoft Intune protected apps.
Step 6: Assign Users
- Select Assignments
- Choose + Select groups to include
- Select user groups
- Optionally exclude specific groups
- Select OK
Step 7: Review and Create
- Review all settings
- Select Create to save the policy
For step-by-step guidance, see How to create and assign app protection policies.
App Protection Policy Settings
Data Protection Settings
Data Transfer:
- Control how data moves between apps
- Restrict copy/paste operations
- Control screen capture
- Manage data sharing to other apps
Data Loss Prevention:
- Prevent saving to personal storage
- Control backup to cloud services
- Restrict printing
- Control contact sync
Access Requirements
Authentication:
- PIN requirements
- Biometric authentication
- Multi-factor authentication
- Conditional launch settings
Device Requirements:
- Minimum OS version
- Jailbreak/root detection
- Device encryption requirements
Conditional Launch
Configure actions when conditions aren't met:
- Block access: Prevent app usage
- Wipe data: Remove organization data
- Warn: Display warning message
Integration with Conditional Access
App protection policies can integrate with Conditional Access to ensure only protected apps can access organizational resources.
App-Based Conditional Access
Create Conditional Access policies that:
- Require app protection policies
- Block access from unmanaged apps
- Enforce MAM policies for specific apps
For guidance, see App-based Conditional Access with Intune.
Monitoring App Protection Policies
Policy Status
Monitor app protection policy status:
- Go to Apps > App protection policies
- Select a policy
- Review User status and Device status
Reports
View detailed reports:
- App protection user report: User-level compliance
- App protection app report: App-level usage
- App protection policy report: Policy-level status
For monitoring guidance, see How to monitor app protection policies.
Best Practices
1. Start with Core Microsoft Apps
Begin by protecting core Microsoft apps:
- Microsoft Outlook
- Microsoft Teams
- Microsoft Word, Excel, PowerPoint
- OneDrive for Business
2. Use Data Protection Framework
Follow Microsoft's data protection framework:
- Level 1 - Enterprise Basic Data Protection
- Level 2 - Enterprise Enhanced Data Protection
- Level 3 - Enterprise High Data Protection
For details, see Data protection framework using app protection policies.
3. Configure Appropriate PIN Requirements
Balance security with usability:
- Require PIN for access
- Set reasonable PIN length (4-6 digits minimum)
- Allow biometric authentication
- Configure appropriate timeout periods
4. Test Before Broad Deployment
- Deploy to pilot groups first
- Test on both enrolled and unenrolled devices
- Verify app functionality
- Gather user feedback
5. Monitor and Adjust
- Review policy status regularly
- Address user issues promptly
- Adjust settings based on feedback
- Update policies as requirements change
Common Scenarios
Scenario 1: BYOD Personal Devices
Configuration:
- Use MAM without device enrollment
- Protect core Microsoft apps
- Require PIN for access
- Block data backup to personal storage
- Allow data sharing to policy-managed apps only
Scenario 2: Corporate-Owned Devices
Configuration:
- Use MAM + MDM
- Deploy apps to devices
- Enforce stricter policies
- Require device compliance
- Integrate with Conditional Access
Scenario 3: High-Security Environment
Configuration:
- Require strong PIN (alphanumeric, 8+ characters)
- Block all data transfer except to managed apps
- Require device encryption
- Block jailbroken/rooted devices
- Enforce app-based Conditional Access
Troubleshooting
Common Issues
-
Policies Not Applying
- Verify user has Intune license
- Check user group assignments
- Ensure apps support app protection policies
- Review policy assignment status
-
Apps Not Working as Expected
- Check app protection policy settings
- Verify app is in targeted apps list
- Review conditional launch settings
- Test with different policy configurations
-
User Access Issues
- Verify user authentication
- Check PIN requirements
- Review conditional launch settings
- Ensure device meets requirements
For troubleshooting guidance, see Frequently asked questions about MAM and app protection.
Additional Resources
- App protection policies overview
- How to create and assign app protection policies
- Mobile Application Management (MAM) basics
- Step 1. Implement app protection policies
- Data protection framework using app protection policies
Conclusion
Intune App Protection Policies provide powerful data protection capabilities for both enrolled and unenrolled devices. By following these best practices:
✅ Choose the right MAM configuration for your scenario
✅ Start with core Microsoft apps
✅ Configure appropriate data protection settings
✅ Integrate with Conditional Access
✅ Monitor and adjust policies regularly
You can protect your organizational data while enabling flexible device usage scenarios, including BYOD, without compromising security.
Remember: App protection policies work at the application level, providing data protection regardless of device enrollment status. This makes them ideal for BYOD scenarios where users want to use personal devices while maintaining organizational data security.