Skip to content

Commit e494c77

Browse files
WIP
1 parent c8f6158 commit e494c77

File tree

1 file changed

+14
-3
lines changed

1 file changed

+14
-3
lines changed

articles/active-directory/conditional-access/how-to-app-protection-policy-windows.md

Lines changed: 14 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ services: active-directory
66
ms.service: active-directory
77
ms.subservice: conditional-access
88
ms.topic: how-to
9-
ms.date: 09/05/2023
9+
ms.date: 10/04/2023
1010

1111
ms.author: joflore
1212
author: MicrosoftGuyJFlo
@@ -17,7 +17,7 @@ ms.collection: M365-identity-device-management
1717
---
1818
# Require an app protection policy on Windows devices (preview)
1919

20-
App protection policies apply [mobile application management (MAM)](/mem/intune/apps/app-management#mobile-application-management-mam-basics) to specific applications on a device. These policies allow for securing data within an application in support of scenarios like bring your own device (BYOD). In the preview, we support applying policy to the Microsoft Edge browser on Windows 11 devices.
20+
App protection policies apply [mobile application management (MAM)](/mem/intune/apps/app-management#mobile-application-management-mam-basics) to specific applications on a device. These policies allow for securing data within an application in support of scenarios like bring your own device (BYOD). In the preview, we support applying policy to the Microsoft Edge browser on Windows 11 devices.
2121

2222
![Screenshot of a browser requiring the user to sign in to their Microsoft Edge profile to access an application.](./media/how-to-app-protection-policy-windows/browser-sign-in-with-edge-profile.png)
2323

@@ -72,6 +72,17 @@ After administrators confirm the settings using [report-only mode](howto-conditi
7272
> [!TIP]
7373
> Organizations should also deploy a policy that [blocks access from unsupported or unknown device platforms](howto-policy-unknown-unsupported-device.md) along with this policy.
7474
75+
In organizations with existing Conditional Access policies that target:
76+
77+
- The **All cloud apps** resource
78+
- The **Mobile apps and desktop clients** condition
79+
- Use **Require app protection policy** or a **Block access** grant control
80+
81+
End users are unable to enroll their Windows device in MAM without the following policy changes.
82+
83+
1. Register the **Microsoft Edge Auth** service principal in your tenant using the command `New-MgServicePrincipal -AppId f2d19332-a09d-48c8-a53b-c49ae5502dfc`.
84+
1. Add an exclusion for **Microsoft Edge Auth** to your existing policy targeting **All cloud apps**.
85+
7586
## Sign in to Windows devices
7687

7788
When users attempt to sign in to a site that is protected by an app protection policy for the first time, they're prompted: To access your service, app or website, you may need to sign in to Microsoft Edge using `[email protected]` or register your device with `organization` if you're already signed in.
@@ -112,7 +123,7 @@ If your policy for Windows devices targets **All apps** your users aren't able t
112123

113124
### Existing account
114125

115-
If there's a pre-existing, unregistered account, like `[email protected]` in Microsoft Edge, or if a user signs in without registering using the Heads Up Page, then the account isn't properly enrolled in MAM. This configuration blocks the user from being properly enrolled in MAM. This is a known issue.
126+
There's a known issue where there's a pre-existing, unregistered account, like `[email protected]` in Microsoft Edge, or if a user signs in without registering using the Heads Up Page, then the account isn't properly enrolled in MAM. This configuration blocks the user from being properly enrolled in MAM.
116127

117128
## Next steps
118129

0 commit comments

Comments
 (0)