Skip to content

Commit e76a0dd

Browse files
[Microsoft Entra] Windows MAM updates
1 parent 928557a commit e76a0dd

File tree

3 files changed

+23
-1
lines changed

3 files changed

+23
-1
lines changed

articles/active-directory/conditional-access/how-to-app-protection-policy-windows.md

Lines changed: 17 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,8 @@ author: MicrosoftGuyJFlo
1313
manager: amycolannino
1414
ms.reviewer: lhuangnorth, jogro
1515

16+
f2d19332-a09d-48c8-a53b-c49ae5502dfc
17+
1618
ms.collection: M365-identity-device-management
1719
---
1820
# Require an app protection policy on Windows devices (preview)
@@ -23,7 +25,9 @@ App protection policies apply mobile application management (MAM) to specific ap
2325

2426
## Prerequisites
2527

26-
Customers interested in the public preview need to opt in using the [MAM for Windows Public Preview Sign Up Form](https://aka.ms/MAMforWindowsPublic).
28+
- [Windows 11 Version 22H2 (OS build 22621)](/windows/release-health/windows11-release-information#windows-11-current-versions) or newer.
29+
- [Configured app protection policy targeting Windows devices](/mem/intune/apps/app-protection-policy-settings-windows).
30+
- Currently unsupported in sovereign clouds.
2731

2832
## User exclusions
2933
[!INCLUDE [active-directory-policy-exclusions](../../../includes/active-directory-policy-exclude-user.md)]
@@ -36,6 +40,12 @@ The following policy is put in to [Report-only mode](howto-conditional-access-in
3640

3741
The following steps help create a Conditional Access policy requiring an app protection policy when using a Windows device. The app protection policy must also be configured and assigned to your users in Microsoft Intune. For more information about how to create the app protection policy, see the article [Preview: App protection policy settings for Windows](/mem/intune/apps/app-protection-policy-settings-windows). The following policy includes multiple controls allowing devices to either use app protection policies for mobile application management (MAM) or be managed and compliant with mobile device management (MDM) policies.
3842

43+
> [!TIP]
44+
> App protection policies (MAM) support unmanaged devices:
45+
>
46+
> - If a device is already managed through mobile device management (MDM), then Intune MAM enrollment is blocked, and app protection policy settings aren't applied.
47+
> - If a device becomes managed after MAM enrollment, app protection policy settings are no longer applied.
48+
3949
1. Sign in to the [Microsoft Entra admin center](https://entra.microsoft.com) as at least a [Conditional Access Administrator](../roles/permissions-reference.md#conditional-access-administrator).
4050
1. Browse to **Protection** > **Conditional Access**.
4151
1. Select **Create new policy**.
@@ -44,6 +54,8 @@ The following steps help create a Conditional Access policy requiring an app pro
4454
1. Under **Include**, select **All users**.
4555
1. Under **Exclude**, select **Users and groups** and choose at least your organization's emergency access or break-glass accounts.
4656
1. Under **Target resources** > **Cloud apps** > **Include**, select **Office 365**.
57+
> [!WARNING]
58+
> Selecting **All apps** prevents users from signing in.
4759
1. Under **Conditions**:
4860
1. **Device platforms**, set **Configure** to **Yes**.
4961
1. Under **Include**, **Select device platforms**.
@@ -96,6 +108,10 @@ To resolve these possible scenarios:
96108
- Wait a few minutes and try again in a new tab.
97109
- Contact your administrator to check that Microsoft Intune MAM policies are applying to your account correctly.
98110

111+
#### All apps selected
112+
113+
If your policy for Windows devices targets **All apps** your users won't be able to sign in. Your policy should only target **Office 365**.
114+
99115
### Existing account
100116

101117
If there's a pre-existing, unregistered account, like `[email protected]` in Microsoft Edge, or if a user signs in without registering using the Heads Up Page, then the account isn't properly enrolled in MAM. This configuration blocks the user from being properly enrolled in MAM. This is a known issue.

articles/active-directory/conditional-access/howto-policy-approved-app-or-app-protection.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -63,6 +63,9 @@ Organizations can choose to deploy this policy using the steps outlined below or
6363

6464
After administrators confirm the settings using [report-only mode](howto-conditional-access-insights-reporting.md), they can move the **Enable policy** toggle from **Report-only** to **On**.
6565

66+
> [!TIP]
67+
> Organizations should also deploy a policy that [blocks access from unsupported or unknown device platforms](howto-policy-unknown-unsupported-device.md) along with this policy.
68+
6669
### Block Exchange ActiveSync on all devices
6770

6871
This policy will block all Exchange ActiveSync clients using basic authentication from connecting to Exchange Online.

articles/active-directory/devices/manage-device-identities.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -111,6 +111,9 @@ To view or copy BitLocker keys, you need to be the owner of the device or have o
111111
- Security Administrator
112112
- Security Reader
113113

114+
> [!NOTE]
115+
> When devices that utilize [Windows Autopilot](/mem/autopilot/windows-autopilot) are reused, **and there is a new device owner**, that new device owner must contact an administrator to acquire the BitLocker recovery key for that device.
116+
114117
## View and filter your devices (preview)
115118

116119
In this preview, you have the ability to infinitely scroll, reorder columns, and select all devices. You can filter the device list by these device attributes:

0 commit comments

Comments
 (0)